What security control may be used to implement a concept known as two-person control?

A. Mandatory vacation
B. Separation of duties
C. Least privilege
D. Defense in depth

Answer: B. Separation of duties

Computer Science & Information Technology

You might also like to view...

Data represents text, numbers, graphics, videos, and sounds entered into the computer's memory during input operations

Indicate whether the statement is true or false

Computer Science & Information Technology

When using the Word mail merge feature, you can print selected documents even after the merge has taken place

Indicate whether the statement is true or false

Computer Science & Information Technology