The ____ captured in system logs can alert the human staff to suspicious activity.

A. system files
B. system backups
C. application data
D. audit trails


Answer: D

Computer Science & Information Technology

You might also like to view...

What is displayed on the console when running the following program?

``` public class Test { public static void main (String[] args) { try { System.out.println("Welcome to Java"); return; } finally { System.out.println("The finally clause is executed"); } } }``` a. Welcome to Java b. Welcome to Java followed by The finally clause is executed in the next line c. The finally clause is executed d. None of the above

Computer Science & Information Technology

Which of the following statements are true?

a. A Node can fire an ActionEvent. b. A Noden can fire a MouseEvent. c. A Node can fire a KeyEvent. d. A Scene can fire a MouseEvent.

Computer Science & Information Technology

A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable

Fill in the blank(s) with correct word

Computer Science & Information Technology

Wiles and Reyes identified four critical characteristics that an evidence storage facility must possess. Which of the following helps describe a good lockup?

a. Nobody except the investigator is allowed in or out once the evidence is secured. b. There can only be a single entrance to the storage room and it must be locked with both an electronic lock and a physical lock. c. Access to the storage facility is limited to authorized storage custodians. d. Video recording equipment must monitor the access door of the facility 24/7 and that recording equipment must not be available to anyone except authorized personnel.

Computer Science & Information Technology