103k views
3 votes
What is used to verify that an administrator is not accessing data that he should not be accessing?

a) authentication
b) encryption
c) access control
d) auditing

1 Answer

2 votes

Final answer:

Auditing is used to verify that an administrator is not inappropriately accessing data, ensuring that all actions are logged for review and accountability.

Step-by-step explanation:

The method used to verify that an administrator is not accessing data they should not be accessing is known as auditing. While authentication is the process of verifying a user's identity, encryption safeguards data in transit from unauthorized access, and access control determines what users can do within a system, auditing is the key process of monitoring and recording actions to ensure compliance with policies and procedures. Auditing allows organizations to detect inappropriate access, providing an accountability trail. When it comes to preventing unauthorized data access, auditing ensures that every action undertaken by administrators is logged so that it can be reviewed and scrutinized if necessary.

User Binarybob
by
8.3k points