Provide some examples of the types of accounting an authenticating server should perform.

What will be an ideal response?

The authenticating server should do some form of accounting, such as logging data traffic, session action, user bandwidth usage, and so on.
 

Computer Science & Information Technology

You might also like to view...

The Y-axis

A) compares values for one set of data. B) is a vertical line that borders the plot area to provide a frame of reference for measurement. C) is text that describes a collection of data points in a chart. D) is a horizontal line that borders the plot area to provide a frame of reference for measurement.

Computer Science & Information Technology

________ is a view that adapts well to touch-based devices, with text flowing easily from page to page

Fill in the blank(s) with correct word

Computer Science & Information Technology