You have collected login information, file access information, security log files, and unauthorized security violations. What is this collection known as?

You have collected login information, file access information, security log files, and unauthorized security violations. What is this collection known as?



A. Audit trail
B. Audit
C. Access control list
D. Security log

Answer: A. Audit trail


Learn More :