Answer:
Access logs should include comprehensive details, including successful and failed access attempts, timestamps, and user identifiers, for effective monitoring.
Access logs should include comprehensive details, including successful and failed access attempts, timestamps, and user identifiers, for effective monitoring.
You may be interested in:
Web Security MCQs