Forensics MCQ
Computer Forensics
E-mail administrators may make use of , which overwrites a log file when it reaches a specified size or at the end of a specified time frame
E-mail administrators may make use of , which overwrites a log file when it reaches a specified size or at the end of a specified time frame
E-mail administrators may make use of , which overwrites a log file when it reaches a specified size or at the end of a specified time frame
a. log recycling
b. circular logging
c. log purging
d. log cycling
Answer: B
Learn More :