Data items to capture for a security audit trail include:
a. events related to the security mechanisms on the system
b. operating system access
c. remote access
d. all of the above
b. operating system access
You might also like to view...
Case-Based Critical Thinking QuestionsCase 5-1Part of your new job on the Web development team is to review the page download sizes of new pages added to the site to make sure that everything added is well-considered. If you know that a new page added to a particular site is mainly viewed by users on DSL connections, how small does the page have to be in order to download in less than a second?
A. smaller than 500 kb B. smaller than 400 kb C. smaller than 200 kb D. smaller than 100 kb
The formula used to multiply cell A1 by cell C1 is ____.
A. =A1*C1 B. C1*A1 C. =A1/C1 D. A1*C1