Respuesta :
Answer:
It is, as long as all the logs are saved and searchable. Retention Recommendations. Logs that provide an effective source of data for identifying targeted attacks as well as helping to determine what actions have been taken need to be protected.
Explanation:
Answer:
if you are using edgunity the answer is C they can use tree ring analyse
Explanation:
i just chose and got 100 on the test so i mean yeah