How does a log act as a deterrent to those who would commit a security violation?

What will be an ideal response?

The potential intruder who knows that a system has this capability will be more reluctant
to make a penetration attempt for fear of eventually being detected.

Computer Science & Information Technology

You might also like to view...

The view in which all revisions and comments are visible is:

a. All Markup b. Final c. Final Markup

Computer Science & Information Technology

To close the preview pane, click the Preview pane button on the View tab in the ____________________ group.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology