New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CFA-001 Exam - Topic 1 Question 24 Discussion

Actual exam question for GAQM's CFA-001 exam
Question #: 24
Topic #: 1
[All CFA-001 Questions]

Operating System logs are most beneficial for Identifying or Investigating suspicious activities involving a particular host. Which of the following Operating System logs contains information about operational actions performed by OS components?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Clorinda
4 months ago
Totally agree, Event logs are key for monitoring!
upvoted 0 times
...
Aretha
4 months ago
Wait, are we sure Event logs are the right answer?
upvoted 0 times
...
Kris
4 months ago
Firewall logs are important too, but not for OS actions.
upvoted 0 times
...
Verona
4 months ago
I think Audit logs are more relevant for security checks.
upvoted 0 times
...
Lasandra
5 months ago
Definitely Event logs! They track all the OS actions.
upvoted 0 times
...
Alisha
5 months ago
I feel like Firewall logs are more focused on network traffic, so they probably wouldn't cover OS component actions.
upvoted 0 times
...
Tresa
5 months ago
I remember practicing a question about logs, and I think Audit logs are more about security-related events rather than operational actions.
upvoted 0 times
...
Milly
5 months ago
I think it might be the Event logs since they track various system events, but I'm not entirely sure.
upvoted 0 times
...
Merilyn
5 months ago
IDS logs are usually for intrusion detection, so I doubt they would contain operational actions either. I'm leaning towards Event logs.
upvoted 0 times
...
Marta
5 months ago
This looks like a straightforward question about interpreting the output from a GLM procedure. I think I can handle this.
upvoted 0 times
...
Cordelia
5 months ago
Wait, I'm a bit confused. Is this about the user not being able to see the business rule in the data form, or is it about them not being able to launch or validate the rule? I need to make sure I understand the core issue before I start selecting answers.
upvoted 0 times
...
Candida
5 months ago
I'm feeling pretty confident about this one. The cloud balancing solution in option B seems like the most straightforward and effective approach.
upvoted 0 times
...

Save Cancel