Access and activity monitoring supports what security principle?
a. Availability
b. Least privilege
c. Accountability
d. Liability
Answer: c. Accountability
Computer Science & Information Technology
You might also like to view...
Basic, Subtle, and Moderate are examples of entrance effect categories
Indicate whether the statement is true or false
Computer Science & Information Technology
The ________ function returns the total number of characters in a string
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology