1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
12

Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and det

ected malware?
a. Departmental reports
b. System logs
c. Scheduled reports
d. Financial report
Computers and Technology
2 answers:
Marrrta [24]3 years ago
6 0

Answer: Option B. System logs

Explanation:

A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.

Umnica [9.8K]3 years ago
5 0
The answer is B System Logs
You might be interested in
Which of these are correctly formatted python lists? check all that apply
myrzilka [38]

The first and third option are actually tuples, not lists. Tuples and lists are identical except for the fact that you cannot change the elements in a tuple but you can in a list. The last option is incorrect because there is no equal sign that assigns those numbers to the variable name list5.

The only option that makes sense is option 2, list2

4 0
3 years ago
Read 2 more answers
3 items that were on Ken’s “big human bee movie
Pie

Answer:

all my special skills, my top 10 favorite movies, I predicted global warming

hope it helped

Explanation:

6 0
4 years ago
Read each example from the opening of a speech on the topic of video gaming. Identify the type of hook being used According to a
skelet666 [1.2K]

Answer:

it goes c, b, b, a

Explanation:

6 0
3 years ago
type of communication where a company’s computers can monitor assembly lines and equipment to keep them running safely and effic
Arisa [49]
<span>Type of communication where a company’s computers can monitor assembly lines and equipment to keep them running safely and efficiently is called machine to machine (M2M).</span>
7 0
3 years ago
Pls answer quick guys
denis23 [38]

Answer:

C

Explanation:

5 0
3 years ago
Other questions:
  • When a chart is selected, numerous customization options can be found on which Chart Tools tabs?
    11·2 answers
  • Two electronics technicians are looking at the piece of testing equipment shown in the figure above. Technician A says that this
    10·1 answer
  • You learned about microcomputer a personal computer designed for use by an individual. Perform online research find out the diff
    12·1 answer
  • A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk tech
    5·1 answer
  • The blank contains the computer's brain the central processing unit CPU
    8·1 answer
  • As featured on Wednesday's show: Researchers in Florida have observed less human impact on what kind of reptile, which nests on
    7·1 answer
  • Why is failure an important part of life and the engineering design process?
    13·2 answers
  • How do you make a ringtone on earsketch
    9·1 answer
  • Rewrite the following program segment using a while loop instead of a for loop.
    11·1 answer
  • Without middleware, different bi programs cannot easily connect to the data warehouse. group of answer choices
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!