ethical-hacker video for given a scenario where an employee is suspected of using their administrative privileges to access restricted areas, what method would
Given a scenario where an employee is suspected of using their administrative privileges to access restricted areas, what method would best monitor and record this activity for further investigation?