While preparing for an audit a security analyst is reviewing the various controls in place to secure the operation of financial processes within the organization. Based on the pre assessment report, the department does not effectively maintain a strong financial transaction control environment due to conflicting responsibilities held by key personnel. If implemented, which of the following security concepts will most effectively address the finding?
A. Least privilege
B. Separation of duties
C. Time-based access control
D. Dual control
Answer: B. Separation of duties
You might also like to view...
A megabyte is 1,048,576 bytes. Explain why it is not 1,000,000.
What will be an ideal response?
Which of the following statements is false?
a. Class SecureRandom’s methods ints, longs and doubles (inherited from class Random) return IntStream, LongStream and DoubleStream, respectively, for streams of random numbers. b. SecureRandom method ints with no arguments creates an IntStream for an infinite stream of random int values. c. An infinite stream is a stream with an unknown number of elements—you use an intermediate operation to complete processing on an infinite stream. d. SecureRandom method ints with a long argument creates an IntStream with the specified number of random int values.
Match the following JavaScript object terms to the descriptions
I. Methods A. Data values passed to an object method II. Attributes B. Represents the current window in JavaScript III. Object C. An object's behaviors IV. Parameters D. An object's characteristics V. Document Object E. Program element that contains both data elements and code
The ________ method of depreciation calculates depreciation at the highest accelerated rate
A) accumulated B) double declining-balance C) declining-balance D) straight-line