Which security measure ensures accountability in an automated record-keeping system?

Prepare for the Montana MPJE. Study with flashcards and multiple choice questions, each question has hints and explanations. Get ready for your exam!

Multiple Choice

Which security measure ensures accountability in an automated record-keeping system?

Explanation:
Accountability in an automated record-keeping system means every action can be traced to a specific person with a time-stamped record of what was done. This requires reliable identification of who is performing each operation, and a log that records that identity alongside the action. Having a unique login for each user provides that clear, individual identity for every function or task performed. When each person uses their own credentials, the system can generate an audit trail showing exactly who did what and when, which is essential for responsibility, integrity of records, and investigations into any discrepancies. Shared logins erase this traceability—it's impossible to tell which person carried out a given action. No login required eliminates authentication entirely, removing any ability to assign actions to specific individuals. Biometric authentication can verify identity, but on its own it does not guarantee that every action is consistently traceable to a particular person across all system functions, especially if access controls or logging are weak or inconsistent. In practice, unique user logins tied to proper logging provide the strongest foundation for accountability.

Accountability in an automated record-keeping system means every action can be traced to a specific person with a time-stamped record of what was done. This requires reliable identification of who is performing each operation, and a log that records that identity alongside the action.

Having a unique login for each user provides that clear, individual identity for every function or task performed. When each person uses their own credentials, the system can generate an audit trail showing exactly who did what and when, which is essential for responsibility, integrity of records, and investigations into any discrepancies.

Shared logins erase this traceability—it's impossible to tell which person carried out a given action. No login required eliminates authentication entirely, removing any ability to assign actions to specific individuals. Biometric authentication can verify identity, but on its own it does not guarantee that every action is consistently traceable to a particular person across all system functions, especially if access controls or logging are weak or inconsistent. In practice, unique user logins tied to proper logging provide the strongest foundation for accountability.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy