Which of the following statements is true about auditing?
A.
It is used to protect the network against virus attacks.
B.
It is used to track user accounts for file and object access, logon attempts, etc.
C.
It is used to secure the network or the computers on the network.
D.
It is used to prevent unauthorized access to network resources.