Which of the following best describes the accounting key information security principle?

A) The logging of access and usage of information resources
B) The configuring of the Security log to record events
C) The process of tracing actions to their source
D) The process of identifying users who seek access to secure information


A) The logging of access and usage of information resources

Computer Science & Information Technology

You might also like to view...

Click the ________ button in the SmartArt Styles group on the SmartArt Design tab to display the Color gallery

Fill in the blank(s) with correct word

Computer Science & Information Technology

What does checking the Update automatically button do in Header and Footer dialog box?

A) Automatically updates edited text within a footer B) Automatically updates the date to always be current C) Updates the header and footer positions if you change slide theme D) Updates the header or footer when the file is saved

Computer Science & Information Technology

The first step in creating a database is to create the file that will store the data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You can modify transitions in Normal or Slide Sorter view. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology