____ authentication is most commonly set up as a form of auditing and occurs when a system records the activities of each user and writes details about each activity to a log file.

A. Local
B. Discretionary
C. Centralized
D. Decentralized

Answer: C

Computer Science & Information Technology

You might also like to view...

Programs that operate in a GUI environment must be:

A) event driven B) in color C) dialog boxes D) layout managers

Computer Science & Information Technology

Write a statement that creates and initializes a multimap of strings and ints with three key– value pairs. ANS:

What will be an ideal response?

Computer Science & Information Technology