What do audit logs that track user activity on an information system provide?

A. identification
B. authorization
C. accountability
D. authentication

Answer: C

Computer Science & Information Technology

You might also like to view...

Each slice in a(n) ________ chart represents a given percentage of the whole

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is the correct hierarchy of iterator categories (weakest at the left)?

a. Input/output, forward, bidirectional, random access. b. Random access, forward, bidirectional, input/output. c. Bidirectional, forward, random access, input/output. d. Input/output, bidirectional, forward, random access.

Computer Science & Information Technology