Data items to capture for a security audit trail include:

a. events related to the security mechanisms on the system

b. operating system access

c. remote access

d. all of the above


b. operating system access

Computer Science & Information Technology

You might also like to view...

The ____ object constructor uses the spaces that separate words to split its String argument into substrings, and then stores each substring.

A. String B. StringContent C. StringHolder D. StringTokenizer

Computer Science & Information Technology

Which of the following is not a control structure:

a. Sequence structure. b. Selection structure. c. Iteration structure. d. Declaration structure.

Computer Science & Information Technology

A company wants to ensure that all aspects if data are protected when sending to other sites within the enterprise. Which of the following would ensure some type of encryption is performed while data is in transit?

A. SSH B. SHA1 C. TPM D. MD5

Computer Science & Information Technology

A troubleshooting activity where there is a current state of events X, a future desired state of events Y, and the troubleshooter's objective is to move from X to Y is called ____.

A. critical thinking B. an analogy C. problem solving D. a goal state

Computer Science & Information Technology