Which of the following Operating System logs contains information about operational actions performed by OS components?

Operating System logs are most beneficial for Identifying or Investigating suspicious activities
involving a particular host. Which of the following Operating System logs contains information
about operational actions performed by OS components?

Operating System logs are most beneficial for Identifying or Investigating suspicious activities
involving a particular host. Which of the following Operating System logs contains information
about operational actions performed by OS components?

A.
IDS logs

B.
Event logs

C.
Audit logs

D.
Firewall logs



Leave a Reply 0

Your email address will not be published. Required fields are marked *