Which of the following will help detect changes made by an intruder to the system log of a server?
A、Mirroring the system log on another server
B、Simultaneously duplicating the system log on a write-once disk
C、Write-protecting the directory containing the system log
D、Storing the backup of the system log offsite