Which of the following could prevent unauthorized or unintentional access or escalation of privileges?
a. Auditing process tracking
b. Auditing bypass traverse checking
c. Auditing replace a process-level token
d. Auditing network logons
Answer: d. Auditing network logons
You might also like to view...
The textbook defines ________ as the exchange of information from one individual or group to another
Fill in the blank(s) with correct word
Which three steps deploy a virtual machine from a VM Template in the Content Library? (Choose three)
a. Right-click a VM Template and select New VM from This Template b. In the vSphere Web Client navigator, select vCenter Inventory Lists> VM templates in Folders c. Using vSphere Host client, select vCenter Inventory Lists> Content Libraries d. in the vSphere Web Client navigator, select vCenter Inventory Lists> Content Libraries e. Select a Content Library, click Related Objects tab and click Templates