After implementing file auditing, which of the following logs would show unauthorized usage attempts seenagape 13 years ago After implementing file auditing, which of the following logs would show unauthorized usage attempts? A.Performance B.System C.Security D.Application ← Previous question Next question →