MultipleChoice
Which of the following archiving methods would maximize log integrity?
OptionsMultipleChoice
An organization has created a policy that allows software from an approved list of applications to be installed on workstations. Programs not on the list should not be installed. How can the organization best monitor compliance with the policy?
Options