A network administrator is reviewing device logs to comply with a security policy that requires identification of unauthorized access attempts. Which log entry will BEST indicate an unauthorized access attempt to a switch within the network infrastructure?
Syslog entries indicating a reconfiguration of port settings
A log entry showing a failed authentication attempt to the switch
Audit logs displaying routine configuration backups
Traffic logs showing increased usage during off-hours