A manager suspects that an IT employee with elevated database access may be knowingly modifying financial transactions for the benefit of a competitor. Which of the following practices should the manager implement to validate the concern?

A. Separation of duties
B. Mandatory vacations
C. Background checks
D. Security awareness training

Answer: A. Separation of duties

Computer Science & Information Technology

You might also like to view...

On a Web page, a(n) ________ effect is one that changes on the page

Fill in the blank(s) with correct word

Computer Science & Information Technology

How would you define a fragment identifier at the top of a page, called "top"?

a.

b.
c.
d.

Computer Science & Information Technology