A programmer designs an application to record user actions in a log file for proper tracking. Which of
the following best describes the recording component of the application?
A technician is reviewing log files to track the number of times that a specific user has logged on to
the networks. Which of the following security concepts is being used?