Answer:
Including timestamps in access logs is significant to provide chronological information about access events for analysis and correlation.
Including timestamps in access logs is significant to provide chronological information about access events for analysis and correlation.
You may be interested in:
Web Security MCQs