Which of the following would be used to monitor unauthorized access to data files?()
- A、Performance Log and Alerts
- B、Event Viewer
- C、Security Configuration and Analysis
- D、IP Security Monitor
正确答案:B
答案解析:有

微信扫一扫手机做题
Which of the following would be used to monitor unauthorized access to data files?()
微信扫一扫手机做题