This log records events such as logon successes and failures.
A. system
B. security
C. application
D. network
Answer: B
Computer Science & Information Technology
You might also like to view...
The MouseButtons enumeration does not contain a ________ constant.
a) Right b) Left c) Middle d) Center e) Both a. and b.
Computer Science & Information Technology
The ____ parameter defines the labels that appear on the drop-down list and the values that are associated with each item.
A. dataBase B. dataVault C. dataProvider D. dataHolder
Computer Science & Information Technology
What criteria must a policy meet to be considered effective and legally enforceable?
What will be an ideal response?
Computer Science & Information Technology
A ____ uses the same wires that carry regular telephone signals into your home.
A. digital subscriber line B. digital subscription link C. digital standard line D. digital standard link
Computer Science & Information Technology