What security control may be used to implement a concept known as two-person control?
A. Mandatory vacation
B. Separation of duties
C. Least privilege
D. Defense in depth
Answer: B. Separation of duties
Computer Science & Information Technology
You might also like to view...
An ________ can be bypassed by holding down the Shift key when opening the database
A) AutoKey B) AutoExec macro C) Action D) Action Group
Computer Science & Information Technology
A document that is often mass produced, with only a small amount of variable data (such as recipient address) is a:
A) directory. B) record. C) form letter. D) data source.
Computer Science & Information Technology