Answer:
Security information from logs can be utilized in compliance audits by providing evidence of security controls and adherence to regulatory requirements.
Security information from logs can be utilized in compliance audits by providing evidence of security controls and adherence to regulatory requirements.
You may be interested in:
Web Security MCQs