Which of the following MAC forensic data components saves file information and related events using a token with a binary structure?
AnswerC
ExplanationOn macOS, the Basic Security Module (BSM) provides the system's audit framework, which records security-relevant activity such as file access, process execution, authentication events, privilege changes, and other system calls. A key forensic characteristic of BSM auditing is that events are written as binary audit records composed of ''tokens.'' Each token represents a structured piece of the event (for example: subject/user identity, process ID, command arguments, path, return value, timestamps), and tokens are assembled into complete audit records. Because these audit logs are binary and tokenized, they are compact, consistent, and designed for reliable parsing and evidentiary reconstruction---important when building timelines of file-related actions and attributing them to specific users and processes.
The other options do not match the ''binary token'' description. Command-line inputs may be stored in shell history files but are plain text and not tokenized binary audit records. User account artifacts (e.g., directory services, plist files) describe identities and settings, not tokenized event logs. Kexts (kernel extensions) are drivers/modules; while they can affect system behavior, they are not the macOS component that stores file/event records in a binary token format. Therefore, the correct answer is Basic Security Module (C).