The ____ principle ensures that inappropriate accesses are identified and reported.

A. authentication
B. repudiation
C. accountability
D. authorization

Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following network topologies would BEST prevent downtime in a WAN environment?

A. Ring B. Star C. Bus D. Mesh

Computer Science & Information Technology

Attempting to access an array element out of the bounds of an array causes a(n) ________.

a) ArrayOutOfBoundsException. b) ArrayElementOutOfBoundsException. c) IndexOutOfRangeException. d) ArrayException.

Computer Science & Information Technology