_________ audit trails may be used to detect security violations within an application or to detect flaws in the application’s interaction with the system.
A. Application-level B. System-level
C. User-level D. None of the above
A. Application-level
Computer Science & Information Technology