General controls for personnel security implement such classic cybersecurity principles as separation of duties, job rotation, and ____.
A. classification
B. mandatory vacations
C. separation of concerns
D. risk mitigation
Answer: A
Computer Science & Information Technology
You might also like to view...
An informal animated graphic used to greet and get the attention of an online contact is called a:
A) wink B) jam C) blink D) nudge
Computer Science & Information Technology
All of the following statements are TRUE about two-variable data tables EXCEPT:
A) The data table can calculate elasticity. B) You must specify both the row input cell and the column input cell from the original data set. C) The top left corner must contain a formula or reference the original formula. D) A custom format can be applied to the formula cell.
Computer Science & Information Technology