Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case.
?
Where can Zach go to check the security logs?

A. NTbtlog.txt
B. Event Viewer
C. Antivirus security logs
D. Action Center

Answer: B

Computer Science & Information Technology

You might also like to view...

What is the intersection of a column and row called?

A) Cell B) Value C) Tab D) Range

Computer Science & Information Technology

The library of a Web site can be viewed in the ____ panel.

A. Site B. Layers C. Assets D. Code

Computer Science & Information Technology