When requesting a log analysis for Sales force’s information Security department, an administrator will NOT get it.
A. An encrypted version of the log file.
B. the User ID of the person being investigated,
C. coaching on how to create the actual view of information
D. the password to decrypt the log file in the same document as the log file.