What two important factors does accountability for access control rely on?

A. Identification and authorization
B. Authentication and authorization
C. Identification and authentication
D. Accountability and authentication


Answer: C. Identification and authentication

Computer Science & Information Technology

You might also like to view...

When an exception occurs it is said to have been ________.

a. caught. b. thrown. c. declared. d. handled.

Computer Science & Information Technology

The computer that made personal computing legitimate in business and industry was the ____________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Using a ____ statement makes a message appear in the Output panel when you perform an action.

A. trace B. syntax C. debugging D. confirmation

Computer Science & Information Technology

The TODAY() and NOW() functions are updated every time you open or ________ the spreadsheet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology