________ is the security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.
A) System integrity
B) Availability
C) Accountability
D) Confidentiality
C) Accountability
Computer Science & Information Technology
You might also like to view...
Character spacing can be adjusted using the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
What are three ways for a host device to receive an IP address? (Select three.)
A) From a DNS server B) From a DHCP server C) Statically assign one D) Assigned by an IPCONFIG server E) APIPA
Computer Science & Information Technology