To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.

A. sniffing
B. surveillance
C. auditing
D. ACL


Answer: C

Computer Science & Information Technology

You might also like to view...

Explain the Java coordinate system for graphic objects.

What will be an ideal response?

Computer Science & Information Technology

Terminal operations are ________; they perform the requested operation when they are called.

a. immediate b. idle c. lazy d. eager

Computer Science & Information Technology

In a Word document, the character indicates that the Enter key has been pressed

Indicate whether the statement is true or false

Computer Science & Information Technology

What is a MAC address?

What will be an ideal response?

Computer Science & Information Technology