What would an IS auditor expect to find in the console log?
A. Evidence of password spoofing
B. System errors
C. Evidence of data copy activities
D. Evidence of password sharing
A. Evidence of password spoofing
B. System errors
C. Evidence of data copy activities
D. Evidence of password sharing