Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case.
?
Where can Zach go to check the security logs?
A. NTbtlog.txt
B. Event Viewer
C. Antivirus security logs
D. Action Center
Answer: B
Computer Science & Information Technology
You might also like to view...
After a document is saved, the name of the file displays on the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
The first sort level is sometimes referred to as the:
A) first sort. B) major sort. C) best sort. D) true sort.
Computer Science & Information Technology