Which of the following best describes the accountability key information security principle?

A) The logging of access and usage of information resources
B) The configuring of the Security log to record events
C) The process of tracing actions to their source
D) The process of identifying users who seek access to secure information


C) The process of tracing actions to their source

Computer Science & Information Technology

You might also like to view...

Define Control Structures.

What will be an ideal response?

Computer Science & Information Technology

In a Base table, the field used to help speed up the sorting of data and to create a join between tables is called the ________ field

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ allows the user to see the effect of a QuickStyle without actually selecting it

A) Live Preview B) Draft view C) Outline view D) Print Preview

Computer Science & Information Technology

When working within large computer networks, which of the following is the disadvantage of using NETBEUI over TCP/IP? (Select TWO).

A. NETBEUI is designed to be used on small size LANs. B. NETBEUI is unavailable on non-Windows operating systems. C. NETBEUI can only be used on pre-Windows NT networks. D. NETBEUI is not a routable protocol. E. NETBEUI can only be used with DHCP

Computer Science & Information Technology