Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case.
?
Where can Zach go to check the security logs?

A. NTbtlog.txt
B. Event Viewer
C. Antivirus security logs
D. Action Center

Answer: B

Computer Science & Information Technology

You might also like to view...

After a document is saved, the name of the file displays on the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The first sort level is sometimes referred to as the:

A) first sort. B) major sort. C) best sort. D) true sort.

Computer Science & Information Technology