What is considered to be an active method in detecting security violations?

What is considered to be an active method in detecting security violations?



Answer: Audit host-level log files


Learn More :