To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.
A. sniffing
B. surveillance
C. auditing
D. ACL
Answer: C
Computer Science & Information Technology
You might also like to view...
Explain the Java coordinate system for graphic objects.
What will be an ideal response?
Computer Science & Information Technology
Terminal operations are ________; they perform the requested operation when they are called.
a. immediate b. idle c. lazy d. eager
Computer Science & Information Technology
In a Word document, the character indicates that the Enter key has been pressed
Indicate whether the statement is true or false
Computer Science & Information Technology
What is a MAC address?
What will be an ideal response?
Computer Science & Information Technology