This log records events such as logon successes and failures.

A. system
B. security
C. application
D. network


Answer: B

Computer Science & Information Technology

You might also like to view...

The MouseButtons enumeration does not contain a ________ constant.

a) Right b) Left c) Middle d) Center e) Both a. and b.

Computer Science & Information Technology

The ____ parameter defines the labels that appear on the drop-down list and the values that are associated with each item.

A. dataBase B. dataVault C. dataProvider D. dataHolder

Computer Science & Information Technology

What criteria must a policy meet to be considered effective and legally enforceable?

What will be an ideal response?

Computer Science & Information Technology

A ____ uses the same wires that carry regular telephone signals into your home.

A. digital subscriber line B. digital subscription link C. digital standard line D. digital standard link

Computer Science & Information Technology