Joe needs to track employees who log into a confidential database and edit files. In the past,
critical files have been edited, and no one admits to making the edits. Which of the following does
Joe need to implement in order to enforce accountability?
A.
Non-repudiation
B.
Fault tolerance
C.
Hashing
D.
Redundancy
A
A
As far as I know , anything that has to do with accountability goes in line with non-repudiation
Agreed, Non-Repudiation
Yup it’s A. Are all of these answers coming from pass4sure? A friend gave me his app so I can study and I find that about 5% of the answers are wrong.
The reason A is correct answer because Hashing Ccn confirm changes to file still but cannot prove who change it
ullo2000 is right. The answer is non-repudiation. Hashing proves integrity, but it does not prove who change it.