單項選擇題

Which of the following would be used to monitor unauthorized access to data files?()

A. Performance Log and Alerts
B. Event Viewer
C. Security Configuration and Analysis
D. IP Security Monitor

微信掃碼免費搜題