CompTIA Exam Questions

After implementing file auditing, which of the following logs would show unauthorized usage attempts

After implementing file auditing, which of the following logs would show unauthorized usage attempts?

A.
Performance

B.
System

C.
Security

D.
Application