Multiple Choice
Audit logs that track user activity on an information system provide ____.
A) identification
B) authorization
C) accountability
D) authentication
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q28: _ are the operations conducted within InfoSec,which
Q29: The activation and use of access control
Q30: Any project manager is better served using
Q31: _ is defined as the application of
Q32: _ are discrete sequences of activities with
Q34: Communications security involves the protection of an
Q35: Which of the following is NOT a
Q36: Another popular project management tool is
Q37: The characteristic of information that enables
Q38: The term _ refers to the end