The capture of data by a hospital's data security system that shows multiple invalid attempts to access the patients' database is an example of ____________.
a. Audit log
b. Access Control
c. Auto-Authentication
d. Override Function