IBM Exam Questions

What additional configuration steps are required before auditing becomes effective?

A system administrator needs to enable security auditing. What additional configuration steps are
required before auditing becomes effective?

A.
Configure the types of events that are recorded.

B.
Configure the types of events that are recorded, and configure failure notifications.

C.
Create a set of users or groups mapped to the Admin Security Manager role.

D.
Create a set of users or groups mapped to the Auditor role, and define the notification
mechanism.

Explanation: