A surveillance video log contains a record, including the exact date and time, of an individual gaining access to his company's office building after hours. He denies that he was there during that time, but the existence of the video log proves otherwise. What benefit of accountability does this example demonstrate?

A. Authorization
B. Deterrence
C. Nonrepudiation
D. Intrusion detection and prevention
E. Authentication


Answer: C. Nonrepudiation

Computer Science & Information Technology

You might also like to view...

Under UNIX, the operating system schedules processes by responding to __________.

a. interrupts b. shell commands c. event signals d. exceptions

Computer Science & Information Technology

Explain why it is better to start at 0 rather than 1 when writing code?

What will be an ideal response?

Computer Science & Information Technology

Default programs are associated with which of the following?

A) File folders B) Devices C) Paths D) File types

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. When locking a layer, you can lock the transparent pixels so that nothing can be added in those areas. _________________________ 2. When locking a layer, you can lock the transparent pixels so the image itself cannot be altered. _________________________ 3. An Opacity setting of 0% means that a layer is completely opaque. _________________________ 4.Reducing the number of pixels increases the file size. _________________________

Computer Science & Information Technology