Access and activity monitoring supports what security principle?

a. Availability
b. Least privilege
c. Accountability
d. Liability

Answer: c. Accountability

Computer Science & Information Technology

You might also like to view...

Basic, Subtle, and Moderate are examples of entrance effect categories

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ function returns the total number of characters in a string

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology