The principles that should be followed for personnel security are: limited reliance on key employees, separation of duties, and _______.

Fill in the blank(s) with the appropriate word(s).

least privilege

Computer Science & Information Technology

You might also like to view...

The maximum number of significant digits is called the ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Choose the sentence type of the following sentence.Rinji uses a debit card, and Nikki pays by check.?

A. ?Simple B. ?Compound C. ?Complex D. ?Compound-complex

Computer Science & Information Technology