Which of the following is NOT a criterion for access control?

A.
Role
B.
Identity
C.
Keystroke monitoring
D.
Transactions
Explanation:
Keystroke monitoring is associated with the auditing function and not access control. For answer a,
the identity of the user is a criterion for access control. The identity must be authenticated as part of
the I & A process. Answer Role refers to role-based access control where access to information is
determined by the user’s job function or role in the organization. Transactions refer to access control
through entering an account number or a transaction number, as may be required for bill payments
by telephone, for example.