1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
12

Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and det

ected malware?
a. Departmental reports
b. System logs
c. Scheduled reports
d. Financial report
Computers and Technology
2 answers:
Marrrta [24]3 years ago
6 0

Answer: Option B. System logs

Explanation:

A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.

Umnica [9.8K]3 years ago
5 0
The answer is B System Logs
You might be interested in
Another name for a computer's operating system
nadya68 [22]

Answer:

core engine or system software.

Explanation:

just because

5 0
3 years ago
Read 2 more answers
What are the two basic categories of film
kati45 [8]
Video and Sound are the 2 most basic categories of film
3 0
3 years ago
Which option best explains the goal of computer science?
skad [1K]

Answer:

B correct answer b i think so

8 0
3 years ago
When an ethernet nic has been configured by os to use half-duplex, the transmit pair of the twisted-pair cable uses?
Maurinko [17]
Simplex, simplex, and half duplex.

Hope this helps!!
8 0
3 years ago
You want to securely erase data from your hard drive what can you use to do this and what is the process called
tankabanditka [31]
You could Factory Reset a computer or you could smash it with  a hammer
7 0
3 years ago
Read 2 more answers
Other questions:
  • How do you know if you get a phone call that is a scam
    8·2 answers
  • which tag does not display the text in the browser window and makes the sources code mode readable ?​
    6·1 answer
  • The while loop has two important parts: a condition that is tested and a statement or block of statements that is repeated as lo
    8·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    10·1 answer
  • Consider relations A and B. Relation A represents the entity on the ""one side"" of a one-to-many relationship; Relation B repre
    11·1 answer
  • To show the navigation pane if it is hidden, click the ____ button
    12·2 answers
  • Trong ửod muốn trình bày dạng cột càn thực hiện lệnh nào
    13·1 answer
  • When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may
    5·1 answer
  • HELP
    11·1 answer
  • The microprogram counter (MPC) contains the address of the next microcode statement for the Mic1 emulator to execute. The MPC va
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!