Operating System logs are most beneficial for Identifying or Investigating suspicious activities involving
a particular host. Which of the following Operating System logs contains information about operational
actions performed by OS components?
A.
IDS logs
B.
Event logs
C.
Audit logs
D.
Firewall logs
Explanation: