Question
41.4% complete
Question
A cybersecurity analyst pulls logs from desktop computers to ensure employees adhere to the company's acceptable use policy. What operating system log is most likely to detail success or failure events when an employee attempts to access a file?
A.Firewall logs
B.Security logs
C.Application logs
D.Endpoint logs
Question
A cybersecurity analyst pulls logs from desktop computers to ensure employees adhere to the company's acceptable use policy. What operating system log is most likely to detail success or failure events when an employee attempts to access a file?
A.Firewall logs
B.Security logs
C.Application logs
D.Endpoint logs
Answers
GPT-4o mini
The correct answer is **B. Security logs**.
Security logs are designed to track access attempts and can detail events related to file access, including successful and failed attempts. These logs are essential for monitoring and enforcing policies regarding access to sensitive data and ensuring compliance with acceptable use policies.
Security logs are designed to track access attempts and can detail events related to file access, including successful and failed attempts. These logs are essential for monitoring and enforcing policies regarding access to sensitive data and ensuring compliance with acceptable use policies.