Which of the following is not part of the three-step auditing process?

A. Enabling auditing for files.
B. Turning on and auditing policy.
C. Evaluating the system log.
D. Reviewing the security log.


C. The system log doesn't play into the auditing process; it deals with drivers, operating system files, and so on.

Computer Science & Information Technology

You might also like to view...

The design view for a select query is divided into three parts

Indicate whether the statement is true or false

Computer Science & Information Technology

A social bookmarking service differs from a social network in that social bookmarking services ________

A) separate short text messages or status updates from a social network into a separate feed B) host real-time text communication between multiple users C) revolve around users' personal profiles and ongoing status updates D) represent a subset of the features found on a social network

Computer Science & Information Technology

To remember what a query does, make the name as ________ as possible

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are the elements of a security case?

What will be an ideal response?

Computer Science & Information Technology