The manager of a department suspects someone is trying to break into computers at night. You are asked to find out if this is the case. What logging would you enable?
- audit
- syslog
- operating system
- Windows
Explanation: Audit logs can track user authentication attempts on workstations and can reveal if any attempts at break-in were made.
Exam with this question: Cybersecurity Essentials Chapter 7 Quiz Answers
Please login or Register to submit your answer