Answer:
Access logs contribute to the identification of security policy violations by highlighting instances where access attempts deviate from defined security policies.
Access logs contribute to the identification of security policy violations by highlighting instances where access attempts deviate from defined security policies.
You may be interested in:
Web Security MCQs