What security control may be used to implement a concept known as two-person control?

A. Mandatory vacation
B. Separation of duties
C. Least privilege
D. Defense in depth

Answer: B. Separation of duties

Computer Science & Information Technology

You might also like to view...

An ________ can be bypassed by holding down the Shift key when opening the database

A) AutoKey B) AutoExec macro C) Action D) Action Group

Computer Science & Information Technology

A document that is often mass produced, with only a small amount of variable data (such as recipient address) is a:

A) directory. B) record. C) form letter. D) data source.

Computer Science & Information Technology