th Module 2 Past Test Samba C&https//eleaning.teex.com/mod/quiajattempt.phplattempt-16315788cmid-93088page-1 eLearning ~ English-United States (en_us) My courses This course , FEMA # Home My courses AWR-138-W : Jan. 29 - July 28 General Module 2 Post Test AWR-138-W Network Assurance What is unique about the security log in Windows? Question 3 Not yer answred Polssi out of 1.00 Select one: O Ordinary users cannot read the log, unlike some other types of logs. stored in the r Fag questionb. This is a trick queation there is no security log Security events are system log o . The security log is automatically purged at the beginning of a session od. The security log is aucomatically saved to a remote server. Logging is the gathering of data with de intention of Select one or more: a. Launching defensive attacks b. Ensuring accurate data Points ous of 1.00 r Flag question c. Attempting to Identify the attacker d. Analyzing data to prevent future attacks O Type here to search th Module 2 Past Test Samba C&https//eleaning.teex.com/mod/quiajattempt.phplattempt-16315788cmid-93088page-1 eLearning ~ English-United States (en_us) My courses This course , FEMA # Home My courses AWR-138-W : Jan. 29 - July 28 General Module 2 Post Test AWR-138-W Network Assurance What is unique about the security log in Windows? Question 3 Not yer answred Polssi out of 1.00 Select one: O Ordinary users cannot read the log, unlike some other types of logs. stored in the r Fag questionb. This is a trick queation there is no security log Security events are system log o . The security log is automatically purged at the beginning of a session od. The security log is aucomatically saved to a remote server. Logging is the gathering of data with de intention of Select one or more: a. Launching defensive attacks b. Ensuring accurate data Points ous of 1.00 r Flag question c. Attempting to Identify the attacker d. Analyzing data to prevent future attacks O Type here to search