Multiple Choice
____ authentication is most commonly set up as a form of auditing and occurs when a system records the activities of each user and writes details about each activity to a log file.
A) Local
B) Discretionary
C) Centralized
D) Decentralized
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q40: IEEE 802.1x is one of the fastest
Q41: Match each item with a statement below.<br>-This
Q42: Match each item with a statement below.<br>-This
Q43: In _, access to a specific set
Q44: A PIN is an example of something
Q46: Access controls are defined only using technology.
Q47: _ access controls help the organization avoid
Q48: With _ authentication, the firewall enables the
Q49: In a lattice-based access control, the column
Q50: Role-based access controls are a type of