What security control may be used to implement a concept known as two-person control?
A. Mandatory vacation
B. Separation of duties
C. Least privilege
D. Defense in depth
Answer: B. Separation of duties
Computer Science & Information Technology
You might also like to view...
Data represents text, numbers, graphics, videos, and sounds entered into the computer's memory during input operations
Indicate whether the statement is true or false
Computer Science & Information Technology
When using the Word mail merge feature, you can print selected documents even after the merge has taken place
Indicate whether the statement is true or false
Computer Science & Information Technology