Multiple Choice
What do audit logs that track user activity on an information system provide?
A) identification
B) authorization
C) accountability
D) authentication
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Corruption of information can occur only while
Q3: Which of the following is the principle
Q7: List and explain the four principles of
Q8: List themeasures that are commonly used to
Q9: What is authentication?Provide some examples.
Q10: The use of cryptographic certificates to establish
Q19: A _ is an attack in which a
Q34: "Shoulder <u>spying</u>" is used in public or
Q56: One form of e-mail attack that is
Q58: _ are malware programs that hide their true