A secure system includes _____ that can log every instance of data entry and changes.

A. audit trails
B. trap trails
C. batch trails
D. control trails

Answer: A

Computer Science & Information Technology

You might also like to view...

The proper way to convert a string to all lowercase is:

a) STRING = string; b) ToLower(string); c) string.ToLower(); d) string.ToLower(string);

Computer Science & Information Technology

Addressing protocols are normally unrelated to the network topology and geographic location of each site.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology