Which of the following is not part of the three-step auditing process?
A. Enabling auditing for files.
B. Turning on and auditing policy.
C. Evaluating the system log.
D. Reviewing the security log.
C. The system log doesn't play into the auditing process; it deals with drivers, operating system files, and so on.
You might also like to view...
The design view for a select query is divided into three parts
Indicate whether the statement is true or false
A social bookmarking service differs from a social network in that social bookmarking services ________
A) separate short text messages or status updates from a social network into a separate feed B) host real-time text communication between multiple users C) revolve around users' personal profiles and ongoing status updates D) represent a subset of the features found on a social network
To remember what a query does, make the name as ________ as possible
Fill in the blank(s) with correct word
What are the elements of a security case?
What will be an ideal response?