After implementing file auditing, which of the following logs would show unauthorized usage attempts?
A.
Performance
B.
System
C.
Security
D.
Application
After implementing file auditing, which of the following logs would show unauthorized usage attempts?
After implementing file auditing, which of the following logs would show unauthorized usage attempts?
A.
Performance
B.
System
C.
Security
D.
Application