A security administrator needs to determine which system a particular user is trying to login to at various times
of the day. Which of the following log types would the administrator check?
The security log records events such as valid and invalid logon attempts, as well as events related to resource
use, such as the creating, opening, or deleting of files. For example, when logon auditing is enabled, an event is
recorded in the security log each time a user attempts to log on to the computer. You must be logged on as
Administrator or as a member of the Administrators group in order to turn on, use, and specify which events are
recorded in the security log.