Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case.
?
Where can Zach go to check the security logs?
A. NTbtlog.txt
B. Event Viewer
C. Antivirus security logs
D. Action Center
Answer: B
Computer Science & Information Technology
You might also like to view...
Special high-speed memory locations that are in the CPU are called ____________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
1, 1, 2, 3, 5, 8, 13, 21, ...What is the tenth Fibonacci number in the sequence above?
A. 21 B. 34 C. 55 D. 89
Computer Science & Information Technology
Excel organizes fonts into theme and non-theme fonts. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The Office Clipboard can only hold one item at a time. _________________________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology