Security auditing can:

a. provide data that can be used to define anomalous behavior
b. maintain a record useful in computer forensics
c. generate data that can be used in after-the-fact analysis of an attack
d. all of the above

d. all of the above

Computer Science & Information Technology

You might also like to view...

To encrypt the database, it must be open in Shared Access mode

Indicate whether the statement is true or false

Computer Science & Information Technology

You can click the Insert Merge Field button arrow to display the Insert Merge Field dialog box

Indicate whether the statement is true or false

Computer Science & Information Technology