You are logged in as userA and you are impersonating userB. How are your activities logged in the access.log?
You are logged in as userA and you are impersonating userB. How are your activities logged in the access.log?
When userA is impersonating userB, the access logs would typically reflect this impersonation clearly. The logged user ID would be 'userA on behalf of userB' to maintain a clear audit trail of the actual user performing the actions (userA) and the impersonated user (userB). This ensures accountability and traceability in the logs.
The answer is C because it is said that " So, if user-B is impersonating user-A, all events look as if user-A performed them."