<p/>
<A NAME="586"><H1>Review</H1></A>
<p/><p/>The following questions will help you determine whether you have learned enough to move on to the <a class='inlineblock cb lh2 dr tr p5' href='98'>next chapter</a>. If you have difficulty answering these questions, please go back and review the material in this chapter before beginning the next chapter. See <a class='inlineblock cb lh2 dr tr p5' href='149'>Appendix A</a>, "Questions and Answers," for the
answers to these questions.<p/>
<p/>What two tasks must you perform to audit access to a file? <p/>Who can set up auditing for a computer? <p/>When you view a security log, how do you determine whether an event failed or succeeded? <p/>If you click the Do Not Overwrite Events option in the Properties dialog box for an audit log, what happens when the log file becomes full?<p/>
<p/><a class='inlineblock cb lh2 dr tr p5' href='149'>Answers</a><p/> - Microsoft Windows 1002000 Professional [Electronic resources] نسخه متنی
The following questions will help you determine whether you have learned enough to move on to the next chapter. If you have difficulty answering these questions, please go back and review the material in this chapter before beginning the next chapter. See Appendix A, "Questions and Answers," for the answers to these questions. What two tasks must you perform to audit access to a file? Who can set up auditing for a computer? When you view a security log, how do you determine whether an event failed or succeeded? If you click the Do Not Overwrite Events option in the Properties dialog box for an audit log, what happens when the log file becomes full? Answers