The ____ principle ensures that inappropriate accesses are identified and reported.
A. authentication
B. repudiation
C. accountability
D. authorization
Answer: C
You might also like to view...
A node with no children is called a_______.
a) subtree node. b) sibling. c) leaf node. d) None of the above.
In an inheritance situation, the new class that you create from an existing class is known as the
A) derived class. B) inheritee. C) child class. D) both A and C E) None of the above
The ________ layer of Open Day light consists of business and network logic applications that control and monitor network behavior.
A) Network applications, orchestration, and services B) APIs C) Controller functions and services D) Service abstraction layer (SAL) E) Southbound interfaces and protocols
a. An external routing protocol
What will be an ideal response?