Most operating systems and applications allow for administrators to configure thedata that will be captured in audit logs for security purposes. Which of thefollowing is the least important item to be captured in audit logs?
A.
System performance output data
B.
Last user who accessed the device
C.
Number of unsuccessful access attempts
D.
Number of successful access attempts
Explanation:
For security purposes it can be important to capture the user’s identity of whorecently accessed a device and the number of successful and unsuccessful accessattempts. Although logs are commonly used to track a system’s performance and fortroubleshooting, this question requested which was least important to be capturedfor security purposes.
I choose A
A would be appropriate.