How does a log act as a deterrent to those who would commit a security violation?
What will be an ideal response?
The potential intruder who knows that a system has this capability will be more reluctant
to make a penetration attempt for fear of eventually being detected.
Computer Science & Information Technology
You might also like to view...
The view in which all revisions and comments are visible is:
a. All Markup b. Final c. Final Markup
Computer Science & Information Technology
To close the preview pane, click the Preview pane button on the View tab in the ____________________ group.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology