A collection of information that includes login, file access, other various activities, and actual or attempted legitimate and unauthorized violations is a(n):

A collection of information that includes login, file access, other various activities, and actual or attempted legitimate and unauthorized violations is a(n):

A collection of information that includes login, file access, other various activities, and actual or attempted legitimate and unauthorized violations is a(n):

A.
Audit

B.
ACL (Access Control List)

C.
Audit trail

D.
Syslog

Explanation:
A record showing who has accessed a computer system and what operations he or she has performed during a given period of time. Audit trails are useful both for maintaining security and for recovering lost transactions.
Most accounting systems and database management systems include an audit trail component. In addition, there are separate audit trail software products that enable network administrators to monitor use of network resources.



Leave a Reply 0

Your email address will not be published. Required fields are marked *