Which of the following key information security principles traces actions to their source?

A) Accountability
B) Assurance
C) Authorization
D) Accounting


A) Accountability

Computer Science & Information Technology

You might also like to view...

Which type of malware self-replicates between computers (from one computer to another)?

A. worm B. Trojan C. virus D. rootkit

Computer Science & Information Technology

A ____ is a segment of code that can handle an exception that might be thrown by the try block that precedes it.

A. catch method B. throw block C. catch block D. throw statement

Computer Science & Information Technology

A(n) ________ informs the user that invalid data has been entered in a cell

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

One of the most important steps when patching the web server is to implement automated patch management

Indicate whether the statement is true or false.

Computer Science & Information Technology