Which of the following best describes the accountability key information security principle?
A) The logging of access and usage of information resources
B) The configuring of the Security log to record events
C) The process of tracing actions to their source
D) The process of identifying users who seek access to secure information
C) The process of tracing actions to their source
You might also like to view...
Define Control Structures.
What will be an ideal response?
In a Base table, the field used to help speed up the sorting of data and to create a join between tables is called the ________ field
Fill in the blank(s) with correct word
________ allows the user to see the effect of a QuickStyle without actually selecting it
A) Live Preview B) Draft view C) Outline view D) Print Preview
When working within large computer networks, which of the following is the disadvantage of using NETBEUI over TCP/IP? (Select TWO).
A. NETBEUI is designed to be used on small size LANs. B. NETBEUI is unavailable on non-Windows operating systems. C. NETBEUI can only be used on pre-Windows NT networks. D. NETBEUI is not a routable protocol. E. NETBEUI can only be used with DHCP