You create Microsoft Windows-based applications. You are creating an internal application. The application requirements are that you can audit the application to discover when users logged on and when they logged off from the application. Logon and logoff events must be stored in a centralized location. The application is designed to use the security credentials of the logged on Windows user. The auditing logon and logoff events policy is enabled for all computers on the
network. Because of these settings, the application does not log any data that is related to logon and logoff events. You need to evaluate the design to find if the application meets the auditing requirements. What should you conclude?
A.
The design meets the requirements. Logon and logoff events are tracked in the security log for the local machine.
B.
The design does not meet the requirements. The application must be changed to use tracing to send data to the security log.
C.
The design does not meet the requirements. The application must be changed to use tracing to send data to a local database.
D.
The design does not meet the requirements. The application must be changed to use tracing to send data to a database server.