What is the information security principle that requires significant tasks to be split up so that more than one individual is required to complete them?
A. need-to-know
B. eyes only
C. least privilege
D. separation of duties
Answer: D
You might also like to view...
To obtain the sine of 35 degrees, use _______.
a. Math.sin(35) b. Math.sin(Math.toRadians(35)) c. Math.sin(Math.toDegrees(35)) d. Math.sin(Math.toRadian(35)) e. Math.sin(Math.toDegree(35))
In the URL http://whitehouse.gov, the top-level domain name is ________
A) http B) whitehouse.gov C) whitehouse D) .gov
Critical Thinking Questions Case Study 7-2? ? You are working on a research paper for class. You are finding several websites that will be helpful when you start writing the paper. You decide to use some of the new tools you have learned about in your computer class. Which of the following tools will you use to highlight the articles? a. web notes b. tabs c. the Hub d. Reading view
What will be an ideal response?
Which subnet mask is an example of classless subnetting?
A. 255.255.255.0 B. 255.255.240.0 C. 255.255.0.0 D. 255.0.0.0