Security auditing can:
a. provide data that can be used to define anomalous behavior
b. maintain a record useful in computer forensics
c. generate data that can be used in after-the-fact analysis of an attack
d. all of the above
d. all of the above
Computer Science & Information Technology
You might also like to view...
To encrypt the database, it must be open in Shared Access mode
Indicate whether the statement is true or false
Computer Science & Information Technology
You can click the Insert Merge Field button arrow to display the Insert Merge Field dialog box
Indicate whether the statement is true or false
Computer Science & Information Technology