A _________is a chronological record of system activities that is sufficient to enable the reconstruction and examination of the sequence of environments and activities surrounding or leading to an operation, procedure, or event in a security-relevant transaction from inception to final results.

Fill in the blank(s) with the appropriate word(s).

security audit trail

Computer Science & Information Technology

You might also like to view...

Which of the following is used to perform a SQL injection exploit?

a. Absinthe b. Amap c. SuperScan d. ObiWan

Computer Science & Information Technology

You can tone down a loud background by using a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology