Which access control process documents the activities of the authenticated individual and systems?

A. Identification
B. Authorization
C. Auditing
D. Accountability


Answer: D

Computer Science & Information Technology

You might also like to view...

When a VBA statement violates the language rules for the statement, a ____ error occurs.

A. syntax B. compilation C. logic D. run-time

Computer Science & Information Technology

________ uses a comma to separate one column from the next, enabling the receiving software to distinguish one set of field values from the next

A) Excel tables B) CSV text files C) Fixed-length text files D) Linked files

Computer Science & Information Technology

Less than (<), greater than (>), and NOT (not equal to) are examples of _____.

A. compound conditions B. comparison operators C. compound values D. conditions

Computer Science & Information Technology

During the ____ step in the incident management process an incident is categorized as a request for information, a question, a problem, a complaint, or a work order.

A. Incident logging B. Incident screening C. Assigning a priority D. Incident assignment

Computer Science & Information Technology