________ is the security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.

A) System integrity
B) Availability
C) Accountability
D) Confidentiality

C) Accountability

Computer Science & Information Technology

You might also like to view...

Character spacing can be adjusted using the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are three ways for a host device to receive an IP address? (Select three.)

A) From a DNS server B) From a DHCP server C) Statically assign one D) Assigned by an IPCONFIG server E) APIPA

Computer Science & Information Technology