How is accountability typically enforced?

A. With smart cards
B. Through the use of asymmetric encryption
C. By checking the hash of all files accessed by a user account
D. Through AAA services

Answer: D. Through AAA services

Computer Science & Information Technology

You might also like to view...

What are the requirements for sucessful installation and use of WDS?

What will be an ideal response?

Computer Science & Information Technology

Write an inheritance hierarchy for class Quadrilateral, Trapezoid, Parallelo- gram, Rectangle and Square. Use Quadrilateral as the base class of the hierarchy. Make the hierarchy as deep (i.e., as many levels) as possible. The data of Quadrilateral should be the (x, y) coordinate pairs for the four endpoints of the Quadrilateral. Write a driver program that creates and displays objects of each

of these classes. What will be an ideal response?

Computer Science & Information Technology