Which of the following is the reason of properly securing an audit log?
A.
To ensure that only authorized person can check the log file.
B.
To ensure that no one can remove it as there is no back up is provided for this log.
C.
To ensure that potential hackers becomes unable to delete the event logs for covering their tracks.
D.
To ensure that potential hackers can be tracked easily without changing the network configuration.