When a security violation occurs, what important information should be logged? (Choose all that apply)
A.
User ID
B.
Timestamp
C.
User’s first and last name
D.
Computer / Terminal ID
E.
All of the items listed
When a security violation occurs, what important information should be logged? (Choose all that apply)
When a security violation occurs, what important information should be logged? (Choose all that apply)
A.
User ID
B.
Timestamp
C.
User’s first and last name
D.
Computer / Terminal ID
E.
All of the items listed
Anyone who included C as an answer, remember, you may not know who the *actual* user was 😉