Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case.
?
Where can Zach go to check the security logs?
A. NTbtlog.txt
B. Event Viewer
C. Antivirus security logs
D. Action Center
Answer: B
Computer Science & Information Technology
You might also like to view...
What are the characteristics of a CRC?
What will be an ideal response?
Computer Science & Information Technology
To open the Find and Replace dialog box with the Go To tab displayed, using shortcut keys, hold down Ctrl and press ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
________ are printouts that show a slide image at the top of a page and notes at the bottom of a page
Fill in the blank(s) with correct word
Computer Science & Information Technology
The computer or print server device offering the printer share is the ____.
A. network print server B. network print manager C. network print client D. network print provider
Computer Science & Information Technology