A security administrator is investigating a recent server breach. The breach occurred as a result of a zero-day
attack against a user program running on the server. Which of the following logs should the administrator
search for information regarding the breach?