Because security-in-depth has been adopted as a goal of your company, a security analyst was hired to complete a security audit. During the audit, the security analyst suggests that your company implements job rotation in several departments. Of which type of controls is this personnel policy?

A. Administrative control
B. Technical control
C. Physical control
D. Corrective control
E. Preventive control
F. Recovery control
G. Statements b and d only
H. Statements a and f only
I. Statements c and e only

A

Explanation: Job rotation is an administrative control. It is also considered to be a detective control, but this is not listed as an option.

Computer Science & Information Technology

You might also like to view...

In what type of trusted recovery process does the system recover against one or more failure types without administrator intervention while protecting itself against data loss?

A. Automated recovery B. Manual recovery C. Function recovery D. Automated recovery without undue data loss

Computer Science & Information Technology

List some characteristics of successful user interface designers with respect to their approach to solving UI problems

What will be an ideal response?

Computer Science & Information Technology