Tracing violations, or attempted violations of system security to the user responsible is a function
of?

A.
authentication
B.
access management
C.
integrity checking
D.
accountability
Explanation:
Auditing capabilities ensure that users are accountable for their actions, verify that
the security policies are enforced, worked as a deterrent to improper actions, and are used asinvestigation tools. – Shon Harris All-in-one CISSP Certification Guide pg 182