Operating System logs are most beneficial for Identifying or Investigating suspicious activities
involving a particular host. Which of the following Operating System logs contains information
about operational actions performed by OS components?
A.
IDS logs
B.
Event logs
C.
Audit logs
D.
Firewall logs