While preparing for an audit a security analyst is reviewing the various controls in place to secure the operation of financial processes within the organization. Based on the pre assessment report, the department does not effectively maintain a strong financial transaction control environment due to conflicting responsibilities held by key personnel. If implemented, which of the following security concepts will most effectively address the finding?

A. Least privilege
B. Separation of duties
C. Time-based access control
D. Dual control

Answer: B. Separation of duties

Computer Science & Information Technology

You might also like to view...

________ moves the selection to the previous field in a table

A) Shift + Tab B) The PageUp key C) The PageDown key D) Tab

Computer Science & Information Technology

Unique ________ differentiate the objects in your application

Fill in the blank(s) with correct word

Computer Science & Information Technology