A security administrator wants to use log facility to enter a log entry when system virus scan scripting completes. What can be done to configure this task?

A.
use the logger command
B.
use the syslogd command
C.
customize the /etc/syslogd.conf file
D.
customize the /etc/dumpadm.conf file