I'm confident that network logons and logoffs, file and object access, and printer access are all good options for security auditing. I'll select those three.
Okay, let me think this through. File and object access seems like a key area to audit for security. And data downloading from the internet could also be an important activity to monitor.
This looks like a straightforward security audit question. I'll start by thinking about the different types of activities that could be monitored for security purposes.
B, C, and D - Logging in and out, files, and even the printer? Wow, they're really leaving no stone unturned in this audit. Better not be printing any love letters at work!
Brock
3 months agoSylvia
3 months agoMoira
3 months agoLavonna
4 months agoNakita
4 months agoStefania
4 months agoPearly
4 months agoBelen
4 months agoShoshana
5 months agoGerald
5 months agoGlendora
5 months agoGertude
5 months agoMayra
5 months agoRikki
5 months agoCallie
5 months agoCordelia
10 months agoKenia
8 months agoKassandra
8 months agoDelila
8 months agoWade
10 months agoIrma
8 months agoMarguerita
8 months agoDylan
9 months agoSolange
10 months agoFabiola
9 months agoMarica
9 months agoSantos
10 months agoAdelaide
10 months agoTasia
9 months agoPeggie
9 months agoKristeen
10 months agoLashanda
10 months agoSlyvia
10 months agoMacy
11 months agoTrevor
11 months agoJennifer
11 months ago