1
Q:
A) Examine the System Event Log on the user's computer. | B) Examine the System Event Log on both domain controllers. |
C) Examine the Security Event Log on both domain controllers. | D) Examine the Application Event Log on the user's computer. |
Answer: C) Examine the Security Event Log on both domain controllers.
Explanation:
Explanation: