A security administrator should have read-only access for which of the following?
A. Router configuration
B. Password policy
C. Security logs
D. Services/daemons configuration
A. Router configuration
B. Password policy
C. Security logs
D. Services/daemons configuration