Through ____ and monitors, an experienced security professional can identify a potential attack.

A. galleries
B. displays
C. screens
D. logs

Answer: D

Computer Science & Information Technology

You might also like to view...

A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type

Indicate whether the statement is true or false

Computer Science & Information Technology

Use the ________ dialog box to add a table to the query design workspace

Fill in the blank(s) with correct word

Computer Science & Information Technology