General controls for personnel security implement such classic cybersecurity principles as separation of duties, job rotation, and ____.

A. classification
B. mandatory vacations
C. separation of concerns
D. risk mitigation


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following pairs demonstrates the has-a relationship between the first and the second terms?

a) car, vehicle b) house, window c) teacher, person d) None of the above

Computer Science & Information Technology

Biometrics refers to the biological information gathered from a human body to authenticate a user. All the following are types of biometrics except ________?

a. Fingerprint reader b. Retina scanner c. Personal identification card d. Voice recognition

Computer Science & Information Technology

Two of the most popular versions of UNIX to come out of the education market were created at the University of California at Berkeley: ____.

A. Berkeley Standard Distribution (BSD) version and System V B. Linux and System V C. Berkeley Standard Distribution (BSD) version and Linux D. System V and GNU

Computer Science & Information Technology

In the figure above, which number refers to the workspace?

A. 3 B. 4 C. 5 D. 6

Computer Science & Information Technology