Which of the following will help detect changes made by an intruder to the system log of a server? 
A、Mirroring the system log on another server 
B、Simultaneously duplicating the system log on a write-once disk 
C、Write-protecting the directory containing the system log 
D、Storing the backup of the system log offsite 
							
