CRISC Certified in Risk and Information Systems Control – Question402

The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?

A.
Intrusion detection system (IDS) rules
B. Penetration test reports
C. Vulnerability assessment reports
D. Logs and system events

Correct Answer: D