General controls for personnel security implement such classic cybersecurity principles as separation of duties, job rotation, and ____.

A. classification
B. mandatory vacations
C. separation of concerns
D. risk mitigation

Answer: A

Computer Science & Information Technology

You might also like to view...

An informal animated graphic used to greet and get the attention of an online contact is called a:

A) wink B) jam C) blink D) nudge

Computer Science & Information Technology

All of the following statements are TRUE about two-variable data tables EXCEPT:

A) The data table can calculate elasticity. B) You must specify both the row input cell and the column input cell from the original data set. C) The top left corner must contain a formula or reference the original formula. D) A custom format can be applied to the formula cell.

Computer Science & Information Technology