____ authentication is most commonly set up as a form of auditing and occurs when a system records the activities of each user and writes details about each activity to a log file.

A. Local
B. Discretionary
C. Centralized
D. Decentralized


Answer: C

Computer Science & Information Technology

You might also like to view...

Paragraph-level styles will have a P and text-level styles will have a T in front of each style in the Manage Styles dialog box

Indicate whether the statement is true or false

Computer Science & Information Technology

Match each item with the correct statement below.

A. Shows suggested revisions in a document. B. C. A pane that can be displayed horizontally or vertically and provides a summary of changes made. D. E. A key item in the header of a news release, along with the date, the release date, and the subject. F. A document that shows the travel schedule of a business person. G. Formatting and _________ are generally shown in balloons. H. A plan for conducting a meeting. I. An itinerary is usually formatted using a _________. J. K. L. Use the _______________ command to make the data items in an itinerary easier to read. M. Typically included in an agenda heading, along with the meeting title, the date, and the time. N. O. A document prior to any revisions being made. P.

Computer Science & Information Technology

What is in an Ethernet frame's trailer?

A. source MAC address B. destination MAC address C. frame payload D. cyclic redundancy check

Computer Science & Information Technology

The mouse pointer in Excel turns into a block arrow whenever it is located in a cell on the worksheet.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology