Joe needs to track employees who log into a confidential database and edit files. In the past, critical files have been edited, and no one admits to making the edits. Which of the following does Joe need to implement in order to enforce accountability?

A. Non-repudiation
B. Fault tolerance
C. Hashing
D. Redundancy

Answer: C. Hashing

Computer Science & Information Technology

You might also like to view...

Match the following commands to the corresponding descriptions

_____ 1. U _____ 2. Esc _____ 3. O _____ 4. q! _____ 5. x _____ 6. dd _____ 7. . (dot) _____ 8. R _____ 9. o _____ 10. ? _____ 11. $ _____ 12. 0 (zero) _____ 13. w _____ 14. u _____ 15. wq a: Searches backward through a file b: Deletes a line c: Opens a line above the current line d: Repeats the last text changes e: Opens a line below the current line f: Exits the vi editor and saves the file. g: Exits the vi editor without saving the file h: Deletes a character indicated by the cursor position i: Undoes the recent changes on the current line j: Replaces character(s) and places vi in the text input mode k Places the cursor at the end of the current line l Places the cursor at the beginning of the current line n Moves the cursor one word forward m Places the vi editor in the command mode o Undoes all changes on the current line.

Computer Science & Information Technology

(What Does this Program Do?) What does the following program print?

``` // Mystery2.cpp #include using namespace std; int main() { unsigned int count{1}; while (count <= 10) { cout << (count % 2 == 1 ? "****" : "++++++++") << endl; ++count; } } ```

Computer Science & Information Technology