Multiple Choice
A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as:
A) Separation of duties
B) Job rotation
C) Mandatory vacation
D) Role reversal
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q12: Discuss the two significant weaknesses of DAC.
Q17: Matching<br>-An attack that constructs LDAP statements based
Q18: List the steps for RADIUS authentication with
Q20: Matching<br>-Providing only the minimum amount of privileges
Q22: To prevent one individual from having too
Q24: The strength of RADIUS is that messages
Q25: A user or a process functioning on
Q25: A shield icon warns users if they
Q26: List two of the most common types
Q29: Describe how Kerberos works.