Which option best describes a record of unauthorized attempts to gain access to a computer system?

Prepare for the ACCA F1 Certification Exam with detailed quizzes featuring multiple choice questions and explanations. Enhance your understanding and ensure success in your exam!

The option that best describes a record of unauthorized attempts to gain access to a computer system is a log. Logs are systematic recordings of events, activities, or transactions that occur within a computer system. In the context of cybersecurity, logs are crucial for monitoring security events and potential breaches since they document specific actions, including failed login attempts. This allows system administrators to detect suspicious behavior and respond appropriately to potential threats.

In contrast, a database refers to a structured collection of data that can be easily accessed, managed, and updated. It does not inherently focus on logging unauthorized attempts or security breaches.

A password is a secret word or phrase used to authenticate a user, providing access to a system, but it does not serve as a record of access attempts.

A register typically refers to a formal record or list of items, but it lacks the specific function of recording security-related events like unauthorized access attempts.

Ultimately, a log serves as an essential tool for tracking, analyzing, and improving security protocols within computer systems, making it the most appropriate choice in this context.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy