
The three elements that form the security corner stone of IP based network management and
policy administration are the so-called Triple-A.
What is not one of the Triple-A elements?
A.
Accounting
B.
Application
C.
Authentication
D.
Authorization
Explanation: