Which technique is commonly used to monitor system events and activities for potential security breaches?
System auditing
Malware scanning
Vulnerability assessment
Penetration testing

Operating Systems Exercises are loading ...