You want to check if anyone has attempted to log in to a Windows 7 system with an incorrect password. Which of the following event logs should you check?

a. Application
b. Security
c. System
d. Service


ANS: B

Computer Science & Information Technology

You might also like to view...

Throughout this chapter, it was assumed that the underlying graph is undirected with non- negative edge weights. Considering the case when the edge weight can be negative or positive, discuss the effect on graph frequencies and their ordering based on the Laplacian quadratic form. What problems might arise in this case?

What will be an ideal response?

Computer Science & Information Technology

When you press the Tab key to enter data in a cell, the data is entered and the active cell moves one screen to the right in the same row

Indicate whether the statement is true or false

Computer Science & Information Technology

The name of the presentation and the name of the program is displayed in the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the absence of an explicit derived class constructor, the compiler automatically calls the default base class constructor first, before the derived class constructor is called.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology