单项选择题

A. Examine the System Event Log on the user’s computer.
B. Examine the System Event Log on both domain controllers.
C. Examine the Security Event Log on both domain controllers.
D. Examine the Application Event Log on the user’s computer.