The ____ captured in system logs can alert the human staff to suspicious activity.

A. system files
B. system backups
C. application data
D. audit trails

Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true about tablet computers?

A) Tablet computers are alternatives to traditional desktop or laptop computers. B) Tablet computers are lightweight, portable, wireless computing devices that use a touch-screen interface. C) Instead of clicking or double-clicking on icons or files, users tap or double-tap on a tablet. D) The speed and width of the swipe often control the amount of movement on screen.

Computer Science & Information Technology

What C++ word is used to read information in from the keyboard?

What will be an ideal response?

Computer Science & Information Technology