The three elements that form the security corner stone of IP based network management and policy administration are the so-called Triple-A.
What is not one of the Triple-A elements?
A. Accounting
B. Application
C. Authentication
D. Authorization