找考题网-背景图
单项选择题

A. Performance Log and AlertsB. Event ViewerC. Security……

Which of the following would be used to monitor unauthorized access to data files?()

A. Performance Log and Alerts
B. Event Viewer
C. Security Configuration and Analysis
D. IP Security Monitor

热门试题