A secure system includes _____ that can log every instance of data entry and changes.
A. audit trails
B. trap trails
C. batch trails
D. control trails
Answer: A
Computer Science & Information Technology
You might also like to view...
The proper way to convert a string to all lowercase is:
a) STRING = string; b) ToLower(string); c) string.ToLower(); d) string.ToLower(string);
Computer Science & Information Technology
Addressing protocols are normally unrelated to the network topology and geographic location of each site.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology