Operating System logs are most beneficial for Identifying or Investigating suspicious activities
involving a particular host. Which of the following Operating System logs contains information
about operational actions performed by OS components?
A.
Event logs
B.
Audit logs
C.
Firewall logs
D.
IDS logs