Through ____ and monitors, an experienced security professional can identify a potential attack.
A. galleries
B. displays
C. screens
D. logs
Answer: D
Computer Science & Information Technology
You might also like to view...
A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type
Indicate whether the statement is true or false
Computer Science & Information Technology
Use the ________ dialog box to add a table to the query design workspace
Fill in the blank(s) with correct word
Computer Science & Information Technology