The security administrator at your company suggests that auditing is configured on all servers. Management decides to make this part of the company's security policy. Which tenet will this cover?

A. Confidentiality
B. Integrity
C. Availability
D. Accountability


D

Explanation: Configuring auditing on all servers will cover the accountability tenet. Auditing is used to log certain actions that are performed by users. Administrators can then review these logs to provide user accountability.

Computer Science & Information Technology

You might also like to view...

When you add a password to a file, an initial password must be reentered a second time for security

Indicate whether the statement is true or false

Computer Science & Information Technology

When using the object element to add an image to a web page, which of the following values should be assigned to the type attribute?

A) It depends on the file type of the actual image being used. B) image/gif C) image/png D) image/jpeg

Computer Science & Information Technology

A(n) ____ is a software tool that allows developers to assemble video games from existing objects and methods.

A. game engine B. Application Programmer Interface C. database D. user interface

Computer Science & Information Technology

Which of the following is not true regarding slide transitions?

a. In the Slide pane, a star displays below the slide number providing a visual cue that a transition has been applied to the slide. b. You can choose from a variety of transitions, and you can control the speed and method with which the slides advance. c. When the On Mouse Click option is selected, the presenter controls when the current slide advances to the next slide by clicking the mouse button or by pressing [s]. d. The Effect Options vary depending on the selected transition and include the direction from which the slide enters the screen or the shape in which the slide displays during the transition.

Computer Science & Information Technology