You are worried that someone has been trying to log into your computer without your permission. How can you view a list of authorized and unauthorized log on attempts?

A. The Setup log in Windows Explorer
B. The Security log in the Event Viewer
C. The Application log in the Event Viewer
D. The Security log in Windows Explorer


B. The Security log in the Event Viewer

Computer Science & Information Technology

You might also like to view...

All of the following are TRUE about VBA procedures EXCEPT:

A) If a Sub procedure is to run when a workbook opens or a worksheet becomes active, then it is typically stored in the workbook or worksheet object to take advantage of the Procedure menu at the top of the Code window. B) Three primary types of procedures are supported by VBA. C) You can have zero or hundreds of Sub procedures and functions written within a single module. D) Function procedures are often used to create custom functions that can be entered in worksheet cells.

Computer Science & Information Technology

Method names that begin with ____ and set are very typical.

A. next B. call C. read D. get

Computer Science & Information Technology

The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process?

A. accountability B. authorization C. identification D. authentication

Computer Science & Information Technology

An object's ____ is the thing on which it "rides."

A. Vehicle B. Platform C. Container D. Module

Computer Science & Information Technology