Q: 5
A technician is reviewing log files to track the number of times that a specific user has logged on to
the networks. Which of the following security concepts is being used?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.