To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.

A. sniffing
B. surveillance
C. auditing
D. ACL


Answer: C

Computer Science & Information Technology

You might also like to view...

A ____ is a unique combination of letters or numbers that identifies a specific user to Windows.

A. user name B. password C. keyboard shortcut D. sign-in screen

Computer Science & Information Technology

It is necessary to use proper capitalization when entering natural language phrases in Outlook.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ________ has an extra layer of special ink in which tiny, precise patches are burned causing them to block light

Fill in the blank(s) with correct word

Computer Science & Information Technology

The row headings displayed in the worksheet used to create a chart in PowerPoint will display along the bottom of the chart as ________

A) category labels B) data labels C) gridlines D) axis titles

Computer Science & Information Technology