Which of the following is least important to be included on a log that captures security violations?

Which of the following is least important to be included on a log that captures security violations?

Which of the following is least important to be included on a log that captures security violations?

A.
User ID

B.
Type of violation

C.
Date and time of violation

D.
Access control in place

Explanation:
The first three items should be included for each security violationdetected. Systems can have several access controls in place, thus not easily logged.Plus the type of access control should not be in this type of documentation.



Leave a Reply 0

Your email address will not be published. Required fields are marked *