Multiple Choice
To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.
A) sniffing
B) surveillance
C) auditing
D) ACL
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q21: The _ PAM module retrieves and makes
Q22: Regarding JAAS, the term _ is used
Q23: The _ class retrieves realm information for
Q24: What are some of the levels that
Q25: In Java, the _ class does this
Q27: The _ class is used by SaslServer
Q28: The Java security architecture itself has the
Q29: The Java platform implements the concept of
Q30: With _, authorization is implemented when you
Q34: _ is the assurance that an entity