Which of the following event logs in the most important from a forensics point of view?
a. Application
b. Security
c. System
d. Service
ANS: B
You might also like to view...
The SCO role works with ____ within the company to ensure that the risk management program remains consistent with organizational policies regarding mitigation and acceptance of risk.
A. risks B. stakeholders C. threats D. investigators
Explain the ways you can distribute your presentation.
What will be an ideal response?
A botnet is a ____.
A. network of robots that control an assembly line at a factory B. network of servers that exchange traffic data C. ?network of devices that are used for managing security D. ?network of computers that send out access requests to servers repeatedly
Which Boolean operator excludes certain words from the search results?
a.AND b.EXCLUDE c.OR d.NOT