Which of the following event logs in the most important from a forensics point of view?

a. Application
b. Security
c. System
d. Service


ANS: B

Computer Science & Information Technology

You might also like to view...

The SCO role works with ____ within the company to ensure that the risk management program remains consistent with organizational policies regarding mitigation and acceptance of risk.

A. risks B. stakeholders C. threats D. investigators

Computer Science & Information Technology

Explain the ways you can distribute your presentation.

What will be an ideal response?

Computer Science & Information Technology

A botnet is a ____.

A. network of robots that control an assembly line at a factory B. network of servers that exchange traffic data C. ?network of devices that are used for managing security D. ?network of computers that send out access requests to servers repeatedly

Computer Science & Information Technology

Which Boolean operator excludes certain words from the search results?

a.AND b.EXCLUDE c.OR d.NOT

Computer Science & Information Technology