Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case.
?
Where can Zach go to check the security logs?

A. NTbtlog.txt
B. Event Viewer
C. Antivirus security logs
D. Action Center


Answer: B

Computer Science & Information Technology

You might also like to view...

Special high-speed memory locations that are in the CPU are called ____________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

1, 1, 2, 3, 5, 8, 13, 21, ...What is the tenth Fibonacci number in the sequence above?

A. 21 B. 34 C. 55 D. 89

Computer Science & Information Technology

Excel organizes fonts into theme and non-theme fonts. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Office Clipboard can only hold one item at a time. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology