Access and activity monitoring supports what security principle?

a. Availability
b. Least privilege
c. Accountability
d. Liability


Answer: c. Accountability

Computer Science & Information Technology

You might also like to view...

If you do not furnish a __________, a default one will be provided by the compiler.

a. constructor b. destructor c. copy constructor d. All of these e. None of these

Computer Science & Information Technology

Which of the following statements is true?

a. System.out.print("Enter your age: "); prompts the user to take action. b. Class names typically begin with a capital letter. c. Package java.lang is imported in every Java program. d. All of the above are true.

Computer Science & Information Technology

In the switch's learning State, the switch is learning source MAC addresses from the received data packets and will add the addresses which of the following?

What will be an ideal response?

Computer Science & Information Technology

Identify and describe a LAN.

What will be an ideal response?

Computer Science & Information Technology