doublejaboveall1858 doublejaboveall1858 30-11-2022 Computers and Technology contestada you are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. which of the following actions would best protect the log files?