What do audit logs that track user activity on an information system provide?
A. identification
B. authorization
C. accountability
D. authentication
Answer: C
Computer Science & Information Technology
You might also like to view...
Each slice in a(n) ________ chart represents a given percentage of the whole
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following is the correct hierarchy of iterator categories (weakest at the left)?
a. Input/output, forward, bidirectional, random access. b. Random access, forward, bidirectional, input/output. c. Bidirectional, forward, random access, input/output. d. Input/output, bidirectional, forward, random access.
Computer Science & Information Technology