The ____ principle ensures that inappropriate accesses are identified and reported.
A. authentication
B. repudiation
C. accountability
D. authorization
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following network topologies would BEST prevent downtime in a WAN environment?
A. Ring B. Star C. Bus D. Mesh
Computer Science & Information Technology
Attempting to access an array element out of the bounds of an array causes a(n) ________.
a) ArrayOutOfBoundsException. b) ArrayElementOutOfBoundsException. c) IndexOutOfRangeException. d) ArrayException.
Computer Science & Information Technology