What information might an operating system deposit in a log file?

What will be an ideal response?


Each login attempt should be logged as well as each attempt to access critical information.
The log should enable auditors to determine who was on the system at any given time
and what they were doing.

Computer Science & Information Technology

You might also like to view...

A(n) ____ is information that a Web server stores on a client computer, such as the client's preferences when accessing a particular Web site, or where the client has been on the Web site.

A. applet B. cookie C. scanner D. listener

Computer Science & Information Technology

There are Word templates available to help you create a resume

Indicate whether the statement is true or false

Computer Science & Information Technology

?Identify a true statement about grids.

A. ?New content cannot be placed within a grid as it will be inconsistent with previously entered information. B. ?Grids slow down the development process for establishing a systematic framework for a page layout. C. ?Grids add order to the presentation of a page content without adding any visual rhythm. D. ?A well designed grid is more easily accessible for users with disabilities and special needs.

Computer Science & Information Technology

Match each item with a statement below:

A. compiles Java program into Java byte codes B. allows Java byte codes to execute C. presents a bounded environment for a Java program to run within D. the gatekeeper of the JVM E. allows you to associate permissions based upon the source of a loaded class F. monitors references to dynamic memory and releases the memory when there are no longer any references to it G. memory pools holding objects of different ages H. class that allows applications to implement a code-level security policy I. a set of Java objects

Computer Science & Information Technology