Which of the following key information security principles traces actions to their source?
A) Accountability
B) Assurance
C) Authorization
D) Accounting
A) Accountability
Computer Science & Information Technology
You might also like to view...
Which type of malware self-replicates between computers (from one computer to another)?
A. worm B. Trojan C. virus D. rootkit
Computer Science & Information Technology
A ____ is a segment of code that can handle an exception that might be thrown by the try block that precedes it.
A. catch method B. throw block C. catch block D. throw statement
Computer Science & Information Technology
A(n) ________ informs the user that invalid data has been entered in a cell
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
One of the most important steps when patching the web server is to implement automated patch management
Indicate whether the statement is true or false.
Computer Science & Information Technology