You are setting up auditing on a Windows Vista Business computer. If it's set up properly, which log should have entries?

A. Application log
B. System log
C. Security log
D. Maintenance log


Answer: C. Security log

Computer Science & Information Technology

You might also like to view...

Can the make utility use object modules stored in an archive file?

What will be an ideal response?

Computer Science & Information Technology

Subscribers to a(n) CSS feed can receive periodic updates using a software program called a feed reader or an aggregator.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which if statement would be true if you needed to see if x (an int) is between 0 and 50 inclusive?

A. ```if( x >= 0 && x < 50 )``` B. ```if( x >= 0 && <= 50 )``` C. ```if( x >= 0 || x <= 50 )``` D. ```if( x > 0 && x < 50 )```

Computer Science & Information Technology

Which of the following statements are true?

a. Inheritance models the is-a relationship between two classes. b. A strong is-a relationship describes a direct inheritance relationship between two classes. c. A weak is-a relationship describes that a class has certain properties. d. A strong is-a relationship can be represented using class inheritance. e. A weak is-a relationship can be represented using interfaces.

Computer Science & Information Technology