Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case.
?
Where can Zach go to check the security logs?
A. NTbtlog.txt
B. Event Viewer
C. Antivirus security logs
D. Action Center
Answer: B
Computer Science & Information Technology