Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case.
?
Where can Zach go to check the security logs?

A. NTbtlog.txt
B. Event Viewer
C. Antivirus security logs
D. Action Center


Answer: B

Computer Science & Information Technology

You might also like to view...

What are the characteristics of a CRC?

What will be an ideal response?

Computer Science & Information Technology

To open the Find and Replace dialog box with the Go To tab displayed, using shortcut keys, hold down Ctrl and press ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ are printouts that show a slide image at the top of a page and notes at the bottom of a page

Fill in the blank(s) with correct word

Computer Science & Information Technology

The computer or print server device offering the printer share is the ____.

A. network print server B. network print manager C. network print client D. network print provider

Computer Science & Information Technology