The ____ principle ensures that inappropriate accesses are identified and reported.

A. authentication
B. repudiation
C. accountability
D. authorization


Answer: C

Computer Science & Information Technology

You might also like to view...

A node with no children is called a_______.

a) subtree node. b) sibling. c) leaf node. d) None of the above.

Computer Science & Information Technology

In an inheritance situation, the new class that you create from an existing class is known as the

A) derived class. B) inheritee. C) child class. D) both A and C E) None of the above

Computer Science & Information Technology

The ________ layer of Open Day light consists of business and network logic applications that control and monitor network behavior.

A) Network applications, orchestration, and services B) APIs C) Controller functions and services D) Service abstraction layer (SAL) E) Southbound interfaces and protocols

Computer Science & Information Technology

a. An external routing protocol

What will be an ideal response?

Computer Science & Information Technology