Which of the following is not part of the three-step auditing process?
A. Enabling auditing for files.
B. Turning on and auditing policy.
C. Evaluating the system log.
D. Reviewing the security log.
C. The system log doesn't play into the auditing process; it deals with drivers, operating system files, and so on.
Computer Science & Information Technology
You might also like to view...
Programs that are designed to monitor a user's behavior and then report it without the user's consent is called spyware
Indicate whether the statement is true or false
Computer Science & Information Technology
In a form, the ________ order is the order in which fields are displayed when the Tab key is pressed
A) tab B) progression C) sequence D) succession
Computer Science & Information Technology