Answer is:
both 1) is a process that uses the spawn mechanism to clobber system performance and 2) spawns copies of itself, using up system resources and perhaps locking out system use by all other processes.
Answer is:
all of these
Explanation:
An audit log
* simply records the time
* user
* type of all access to an object
Answer is:
all of these
Explanation:
Audit log can be used to
* determine how and when the problem occurred
* what amount of damage was done
* when security has been violated