General controls for personnel security implement such classic cybersecurity principles as separation of duties, job rotation, and ____.
A. classification
B. mandatory vacations
C. separation of concerns
D. risk mitigation
Answer: A
You might also like to view...
Which of the following pairs demonstrates the has-a relationship between the first and the second terms?
a) car, vehicle b) house, window c) teacher, person d) None of the above
Biometrics refers to the biological information gathered from a human body to authenticate a user. All the following are types of biometrics except ________?
a. Fingerprint reader b. Retina scanner c. Personal identification card d. Voice recognition
Two of the most popular versions of UNIX to come out of the education market were created at the University of California at Berkeley: ____.
A. Berkeley Standard Distribution (BSD) version and System V B. Linux and System V C. Berkeley Standard Distribution (BSD) version and Linux D. System V and GNU
In the figure above, which number refers to the workspace?
A. 3 B. 4 C. 5 D. 6