________ is the security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.

A) System integrity
B) Availability
C) Accountability
D) Confidentiality


C) Accountability

Computer Science & Information Technology

You might also like to view...

Over the past two years a cloud service consumers have made 24,531 attempts to invoke a cloud service’s reporting capability. Of those attempts, 22,904 resulted in the successful execution of this capability. Based on these statistics, what is the reliability rating of the cloud service’s reporting capability?

What will be an ideal response?

Computer Science & Information Technology

The feature of modular programs that allows individual modules to be used in a variety of applications is known as ____.

A. reusability B. readability C. reliability D. consistency

Computer Science & Information Technology

The time it takes to serve a customer is the ____.

A. transaction time B. flight time C. request time D. service time

Computer Science & Information Technology

You can perform a ____________________ to verify how well your Flash project functions among different users.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology