Which of the following risk related concepts BEST supports the identification of fraud?

A. Risk avoidance
B. Job rotation
C. ALE calculation
D. Clean desk policy


Answer: B. Job rotation

Computer Science & Information Technology

You might also like to view...

Discuss the aim of the application and system security function.

What will be an ideal response?

Computer Science & Information Technology

Methods in a class that do not provide implementations must be declared using keyword _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Video game testers are employed in the video game industry to examine games for both correctness and playability.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You are required to include a value attribute or enter a value into a field before the form data is submitted.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology