Ask Question
7 March, 08:07

One of your primary business objectives is being able to trust the data stored in your application. You want to log all changes to the application data.

How can you design your logging system to verify authenticity of your logs?

A. Write the log concurrently in the cloud and on premises

B. Use a SQL database and limit who can modify the log table

C. Digitally sign each timestamp and log entry and store the signature

D. Create a JSON dump of each log entry and store it in Google Cloud Storage

+1
Answers (1)
  1. 7 March, 10:42
    0
    C

    Explanation:

    Based on the information provided within the question it can be said that the best way to accomplish this would be to digitally sign each timestamp and log entry and store the signature. This is because each timestamp and log entry would be ran through a verification algorithm which would then be stamped with your digital signature that requires your private keys, thus preventing forgery.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “One of your primary business objectives is being able to trust the data stored in your application. You want to log all changes to the ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers