answersLogoWhite

0

Any and all information that would be useful to an auditor. The information should be presented in such a manner as the auditor can filter messages in any way they see fit.

User Avatar

Wiki User

7y ago

What else can I help you with?

Continue Learning about Engineering

Can ventless natural gas logs be converted to vented gas logs?

yes it can, open damper in fireplace for drafting while gas logs are being used. As far as converting burners, NO. Ventless and vented burners and logs are different in design.


What were the roads called that were constructed by placing logs close together?

corduroy roads


When advantages do a procedural language have over a declarative language?

procedural language can also refer to a programming paradigm, derived from structured programming based upon the concept of the procedure call. Procedures, also known as routines, subroutines, methods, or functions.declaration language defining basic data structures such as lists, maps, and trees of typed data in a compact, easy to read representation.A simple application programming interface (API) allows reading, writing and accessing all the data structures using one class. For property files, configuration files, logs and simple serialization requirements, SDL is designed to be an alternative to Extensible Markup Language (XML)


How does Pidgin create log files?

Pidgin creates logs by saving the contents of all incoming and outgoing messages to a series of files on your hard drive. The log directory can be found in Linux under ~/.purple/logs . Inside the log directory the files have the following setup: protocol/screenname/buddyScreenname/yyyy-mm-dd-hhmmss.html So for instance, if I started talking to my friend bob on AIM from my screenname CoolGuy at 1:49 PM on Jan 23, 2009, the file would be saved as logs/aim/coolguy/bob/2009-01-23-134900.html


What is the process of making paper?

=Cut the logs - debarking - cut into tiny pices- Mix water with chemials- Add dye or==bleach- PULP- Dry and flatten into sheets- PAPER=

Related Questions

Audit logs should be reviewed at least?

Once a Week.


How long will client machine audit logs be maintained for?

Client machine's audit logs will be maintained for at least:


How long will Client machine audit logs be maintained?

Client machine's audit logs will be maintained for at least:


How often should audit logs be reviewed in the ia army system?

Once a week


How long should audit logs should be reviewed?

預付愚夫愚婦


How long Client machine s audit logs will be maintained?

90 days


What log do you use to record events based on audit policies?

Security Logs


WHAT IS Non-repudiation of data?

Non-repudiation of data refers to the ability to prove that a specific individual took a particular action and cannot deny it later. It ensures that the sender of a message or creator of data cannot later deny the authenticity of their actions. This is often achieved through the use of digital signatures or audit logs.


How often should an audit log be reviewed?

Audit logs should be reviewed regularly, ideally on a monthly basis, to ensure timely detection of any unusual or unauthorized activities. However, the frequency may vary based on the organization's risk profile, regulatory requirements, and the sensitivity of the data involved. In high-risk environments or after significant changes, more frequent reviews may be warranted. Additionally, organizations should also conduct thorough reviews after any security incidents or breaches.


What is logs use for?

Some examples of uses of data logging are collecting things data such as weather data (e.g. wind speed, amount of rain, temperature).The data is collected electornically, sometimes by sensors instead of having a person there to doit all the time. This means data can be more exact and can be collected much oftener than a person could and more data can be collected on the same time.


What logs record events based on audit policies which an administrator sets to monitor user activity?

security log


What should not be included in regular data backups?

Viruses, worms, spyware, etc. and cookies and cache. Logs are not needed either.