____ authentication is most commonly set up as a form of auditing and occurs when a system records the activities of each user and writes details about each activity to a log file.
A. Local
B. Discretionary
C. Centralized
D. Decentralized
Answer: C
Computer Science & Information Technology
You might also like to view...
Programs that operate in a GUI environment must be:
A) event driven B) in color C) dialog boxes D) layout managers
Computer Science & Information Technology
Write a statement that creates and initializes a multimap of strings and ints with three key– value pairs. ANS:
What will be an ideal response?
Computer Science & Information Technology