Multiple Choice
____ requires that if the fraudulent application of a process could potentially result in a breach of security, then the process should be divided between two or more individuals.
A) Separation of duties
B) Job rotation
C) Mandatory vacation
D) Role reversal
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q24: The strength of RADIUS is that messages
Q25: A shield icon warns users if they
Q27: List two major access control models.
Q29: Often _ results from a single user
Q30: _ is an authentication system developed by
Q32: A user under Role Based Access Control
Q36: TACACS+ and RADIUS are designed to support
Q37: A user accessing a computer system must
Q38: _ is suitable for what are called
Q49: Describe the MAC lattice model.