Which of the following key information security principles traces actions to their source?

A) Accountability
B) Assurance
C) Authorization
D) Accounting

A) Accountability

Computer Science & Information Technology

You might also like to view...

To move from one comment to the next, you click the Next button in the:

A) Comments group on the View Tab. B) Comments group on the Review Tab. C) Review group on the Comments Tab. D) View group on the Comments Tab.

Computer Science & Information Technology

What are the values in the array after execution of the following code?

int a[4] = {3, 7, 6, 2}; int i = 2; a[i] = i + 1; a[i + 1] = a[ i – 1]; a[1] = 5; a) 5, 3, 3, 6 b) 3, 5, 3, 7 c) 5, 7, 3, 7 d) 5, 7, 2, 1

Computer Science & Information Technology