Q:

A log of all changes to the application data is called as __________

0

A log of all changes to the application data is called as __________


  1. Audit trail
  2. Audit log
  3. Audit lead
  4. Data log

All Answers

need an explanation for this answer? contact us directly to get an explanation for this answer

 (a).Audit trail

need an explanation for this answer? contact us directly to get an explanation for this answer

total answers (1)

CRYPTOGRAPHY AND NETWORK SECURITY - NETWORK SECURITY CONCEPTS MCQ

This question belongs to these collections

Similar questions


need a help?


find thousands of online teachers now
Which of the following is a valid encryption techn... >>
<< What is the standard for exchanging authentication...