Which of the following types of logs could provide clues that someone has been attempting to compromise the
SQL Server database?
Event logs include Application logs, such as those where SQL Server would write entries. This is where you
would see logs with details of someone trying to access a SQL database.