make sure is 100% original not copy this first question Discuss the configuration and activation of auditing for files, users or other system objects to help technical personnel recognize, diagnose, deter and/or work to prevent attempts to compromise or break into a computer network. this second question Complete the main portion of this assignment as outlined below. Briefly describe how the following tools are used: Event viewer Authority delegation Update services Describe 1 scenario in which each tool would be used. .