The ____ captured in system logs can alert the human staff to suspicious activity.
A. system files
B. system backups
C. application data
D. audit trails
Answer: D
You might also like to view...
What is displayed on the console when running the following program?
``` public class Test { public static void main (String[] args) { try { System.out.println("Welcome to Java"); return; } finally { System.out.println("The finally clause is executed"); } } }``` a. Welcome to Java b. Welcome to Java followed by The finally clause is executed in the next line c. The finally clause is executed d. None of the above
Which of the following statements are true?
a. A Node can fire an ActionEvent. b. A Noden can fire a MouseEvent. c. A Node can fire a KeyEvent. d. A Scene can fire a MouseEvent.
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable
Fill in the blank(s) with correct word
Wiles and Reyes identified four critical characteristics that an evidence storage facility must possess. Which of the following helps describe a good lockup?
a. Nobody except the investigator is allowed in or out once the evidence is secured. b. There can only be a single entrance to the storage room and it must be locked with both an electronic lock and a physical lock. c. Access to the storage facility is limited to authorized storage custodians. d. Video recording equipment must monitor the access door of the facility 24/7 and that recording equipment must not be available to anyone except authorized personnel.