When a security violation occurs, what important information should be logged? (Choose all that
apply)
A.
User ID
B.
Timestamp
C.
User’s first and last name
D.
Computer / Terminal ID
E.
All of the items listed
When a security violation occurs, what important information should be logged? (Choose all that
apply)
When a security violation occurs, what important information should be logged? (Choose all that
apply)
A.
User ID
B.
Timestamp
C.
User’s first and last name
D.
Computer / Terminal ID
E.
All of the items listed