Audit logs that track user activity on an information system provide ____.
A) identification
B) authorization
C) accountability
D) authentication
Correct Answer:
Verified
Q61: Autocratic leaders usually _.
A) seek input from
Q62: Identification is typically performed by means of
Q63: _ security addresses the ability to use
Q64: The activation and use of access control
Q65: _ occurs when a control provides proof
Q67: A manager has informational,interpersonal,and _ roles within
Q68: According to the C.I.A.triangle,the three desirable characteristics
Q69: The characteristic of _ exists when a
Q70: Strategic planning _.
A) focuses on production planning
B)
Q71: The process that develops,creates,and implements strategies for
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents