Joe needs to track employees who log into a confidential database and edit files. In the past, critical files have been edited, and no one admits to making the edits. Which of the following does Joe need to implement in order to enforce accountability?

A. Non-repudiation
B. Fault tolerance
C. Hashing
D. Redundancy


Answer: C. Hashing

Computer Science & Information Technology

You might also like to view...

Give an example of a Java object that can be serialized into the parts of the messages in the WSDLgetFareOperation.

What will be an ideal response?

Computer Science & Information Technology

The ____ method stops the current iteration of the loop and immediately begins a new iteration. However, before the new iteration occurs, the loop condition is evaluated.

A. next B. after C. before D. None of the above

Computer Science & Information Technology

Explain the boot procedure.

What will be an ideal response?

Computer Science & Information Technology

A View represents a piece of the screen area that displays an object.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology