_________ audit trails may be used to detect security violations within an application or to detect flaws in the application’s interaction with the system.

A. Application-level B. System-level

C. User-level D. None of the above

A. Application-level

Computer Science & Information Technology

You might also like to view...

Word's sorting feature allows you to sort a table by a maximum of ________ categories

Fill in the blank(s) with correct word

Computer Science & Information Technology

All hacking is done with malicious intent.

a. true b. false

Computer Science & Information Technology