Which of thefollowing is the least important item to be captured in audit logs?

Most operating systems and applications allow for administrators to configure thedata that will be captured in audit logs for security purposes. Which of thefollowing is the least important item to be captured in audit logs?

Most operating systems and applications allow for administrators to configure thedata that will be captured in audit logs for security purposes. Which of thefollowing is the least important item to be captured in audit logs?

A.
System performance output data

B.
Last user who accessed the device

C.
Number of unsuccessful access attempts

D.
Number of successful access attempts

Explanation:
For security purposes it can be important to capture the user’s identity of whorecently accessed a device and the number of successful and unsuccessful accessattempts. Although logs are commonly used to track a system’s performance and fortroubleshooting, this question requested which was least important to be capturedfor security purposes.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


networkmanagers

networkmanagers

I choose A

Sam

Sam

A would be appropriate.