To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.
A. sniffing
B. surveillance
C. auditing
D. ACL
Answer: C
Computer Science & Information Technology
You might also like to view...
A ____ is a unique combination of letters or numbers that identifies a specific user to Windows.
A. user name B. password C. keyboard shortcut D. sign-in screen
Computer Science & Information Technology
It is necessary to use proper capitalization when entering natural language phrases in Outlook.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A(n) ________ has an extra layer of special ink in which tiny, precise patches are burned causing them to block light
Fill in the blank(s) with correct word
Computer Science & Information Technology
The row headings displayed in the worksheet used to create a chart in PowerPoint will display along the bottom of the chart as ________
A) category labels B) data labels C) gridlines D) axis titles
Computer Science & Information Technology