Which of the following should be logged for security problems?

A.
Use of mount command.
B.
Percentage of idle time.
C.
Percentage of use.
D.
None of the choices.
Explanation:
The level of logging will be according to your company requirements. Below is a list of
items that could be logged, please note that some of the items may not be applicable to
all operating systems. What is being logged depends on whether you are looking for
performance problems or security problems. However you have to be careful about
performance problems that could affect your security.