James has detected an intrusion in his company. What should he check first?
A. DNS logs
B. Firewall logs
C. Event Viewer
D. Performance logs
B. If there were an intrusion, the first thing you should check are the firewall logs. DNS logs in the event viewer and the performance logs will most likely not show intrusions to the company. The best place to look first is the firewall logs.
You might also like to view...
__________ external devices are suitable for communicating with electronic equipment.
A) ?Communication ? B) ?Application C) ?Machine readable ? D) ?Human readable
Primary tables represent the static lists of things that exist in a business such as customers, products, and suppliers. Related tables represent concepts or events
Indicate whether the statement is true or false
When adding a fill color to a cell, the color palette is displayed by clicking the Fill Color button
Indicate whether the statement is true or false
Microsoft Expression is a:
A) Word add-in for Web page design. B) Microsoft's Web page name. C) Web page template for Word. D) Web page design tool.