The IT Director of the company is very concerned about the security of the network. Which audit policy should he implement to detect possible intrusions into the network? (Click the Exhibit button on the toolbar to see the case study.)
A.
The success and failure auditing for policy change.
B.
The success and failure auditing for process tracking.
C.
The success and failure auditing for logon events.
D.
The success and failure auditing for privilege use.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit