1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
12

Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and det

ected malware?
a. Departmental reports
b. System logs
c. Scheduled reports
d. Financial report
Computers and Technology
2 answers:
Marrrta [24]3 years ago
6 0

Answer: Option B. System logs

Explanation:

A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.

Umnica [9.8K]3 years ago
5 0
The answer is B System Logs
You might be interested in
In programming 5/2 is an example of what math?
wlad13 [49]

Answer:

division

Explanation:

/ in programming language is divide ÷

6 0
2 years ago
Read 2 more answers
. What is suboptimization?
Vera_Pavlovna [14]

Answer: Suboptimization is referred to as a term that has been approved for common policy mistake. It usually refers to the practice of concentrating on a single component of a whole and thus making changes which are intended towards improving that component and also ignoring its effects on other components.

3 0
3 years ago
How do take a picture on this to ask?
Galina-37 [17]
What computer are you on, To take a screenshot on a chromebook press control shift then the switch screens button

If any other computer use snipping tool. Or look up how to screenshot on (Your computer)

Then click that paperclick and go to the file of the screenshot and click it. Then type in a question and click ask.
3 0
3 years ago
open your browser and enter the address of this ftp site in the address box: ftp.cengage. if your browser supports ftp, a logon
Licemer1 [7]

FTP access is available from other companies, but access is constrained unless the user first authenticates by supplying a user name and potentially a password.

The files are frequently intended for specific uses rather than for public release. For instance, you must send a letter house your consumer address list. Both businesses would not want the public to have access to these materials in this situation. Software is a collection of instructions, data, or computer programs that are used to run machines and carry out particular activities. It is the antithesis of hardware, which refers to a computer's external components. A device's running programs, scripts, and applications are collectively referred to as "software" in this context. Software refers to the processes and programs that enable a computer or other electrical device to function.

Learn more about software here-

brainly.com/question/985406

#SPJ4

7 0
1 year ago
What is the main disadvantage of parallel circuits?
ANTONII [103]

Answer:

If one bulb goes out, the other bulbs will go out.

They are complicated to design and build.

7 0
3 years ago
Other questions:
  • As of 2012, Twitter has approximately how many members?
    10·1 answer
  • Which computer device helps you input data in the form of text, numbers, and commands?
    9·1 answer
  • It's inventiveness, uncertainty futuristic ideas typically deal with science and technology.what is it?
    14·1 answer
  • Write a class named GasTank containing: An instance variable named amount of type double, initialized to 0. An instance variable
    13·1 answer
  • Which of the following statements is true with regards to satellite Internet access?
    13·2 answers
  • A network technician has created a network consisting of an external internet connection, a DMZ,
    14·1 answer
  • The point of entry from a wireless device to a wired network is performed at a device called a(n) ____________________.
    10·1 answer
  • Which of the following statements about version control are true? Select 3 options.
    7·2 answers
  • What is the home page on a website?
    7·1 answer
  • PLEASE HELP!! THIS IS DUE SOON.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!