Get contacted by recruiters directly with our newest chat feature!
Register now or log in to join your professional community.
It is (b) detective control
It's more of a detective control. Keeping logs of system facilitates the review of unauthorized access attempts or other anomalies/abnormalities
Cancel Report Answer