单项选择题
Which of the following would be used to monitor unauthorized access to data files?()
A. Performance Log and Alerts
B. Event Viewer
C. Security Configuration and Analysis
D. IP Security Monitor
点击查看答案&解析
相关考题
