What should occur if audit logs fill up and the system cannot record monitoring information?

Prepare for the Network Security Vulnerability Technician Test. Utilize flashcards and multiple choice questions with hints and explanations to excel on your exam!

When audit logs fill up and the system cannot record monitoring information, switching to a secure posture is a prudent response. This action typically involves restricting certain activities or functions within the system to mitigate risks that could arise from the inability to log events. By transitioning to a secure posture, the system prioritizes security over operational functionality, ensuring that further actions are limited until the logging capacity can be restored.

In contrast, shutting down entirely would halt operations and could lead to significant disruptions, making it less practical in most scenarios. Continuing to operate without recording would leave the system blind to activities that could compromise security, thereby increasing vulnerability. Sending a notification to IT personnel is a sensible step, but merely notifying them does not address the immediate concern of security and the need to maintain a secure operational environment. Switching to a secure posture effectively manages the risk associated with full audit logs while still allowing the system to function within a limited scope.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy