Which of the following is not part of the three-step auditing process?

A. Enabling auditing for files.
B. Turning on and auditing policy.
C. Evaluating the system log.
D. Reviewing the security log.

C. The system log doesn't play into the auditing process; it deals with drivers, operating system files, and so on.

Computer Science & Information Technology

You might also like to view...

Programs that are designed to monitor a user's behavior and then report it without the user's consent is called spyware

Indicate whether the statement is true or false

Computer Science & Information Technology

In a form, the ________ order is the order in which fields are displayed when the Tab key is pressed

A) tab B) progression C) sequence D) succession

Computer Science & Information Technology