Answer:
Authentication event logs should include information such as timestamps, IP addresses, and authentication outcomes.
Authentication event logs should include information such as timestamps, IP addresses, and authentication outcomes.
You may be interested in:
Web Security MCQs