CRISC Certified in Risk and Information Systems Control – Question412

Which of the following would BEST help to ensure that suspicious network activity is identified?

A.
Analyzing server logs
B. Coordinating events with appropriate agencies
C. Analyzing intrusion detection system (IDS) logs
D. Using a third-party monitoring provider

Correct Answer: C