Pregunta 1 con grado de dificultad 2: What is useful to detect penetration of a computer system and to identify misuse?
Imagen

a) Security policy.

b) Antivirus.

c) Audit trail.

d) Documentation.

e) Security plan.

f) Audit trail.

g) Audit trail.