Which of the following statements best describes authentication server logs?
A. Authentication server logs capture user, group, and administrative activity.
B. Authentication server logs capture bad HTML code.
C. Authentication server logs capture SQL injection attempts.
D. Authentication server logs capture web traffic.