________ enables you to track actions performed by users across the domain, such as logging on and off or file and folder access

a. Roaming
b. Logging
c. Publishing
d. Auditing

D. When you create and apply an auditing policy, auditable events are recorded in the security log of the computer at which they happen.

Computer Science & Information Technology

You might also like to view...

The only switch on a LAN that has all designated interfaces is the ________ switch

A) Root B) Main C) Primary D) Forwarding

Computer Science & Information Technology

Which of the following is NOT a reason for using procedures?

(A) They break a complex problem down into smaller pieces. (B) They make a program run faster. (C) They can be reused easily. (D) They make it easier for a team of people to work together on a single program.

Computer Science & Information Technology