A _________is a chronological record of system activities that is sufficient to enable the reconstruction and examination of the sequence of environments and activities surrounding or leading to an operation, procedure, or event in a security-relevant transaction from inception to final results.
Fill in the blank(s) with the appropriate word(s).
security audit trail
Computer Science & Information Technology
You might also like to view...
Which of the following is used to perform a SQL injection exploit?
a. Absinthe b. Amap c. SuperScan d. ObiWan
Computer Science & Information Technology
You can tone down a loud background by using a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology