A manager suspects that an IT employee with elevated database access may be knowingly modifying financial transactions for the benefit of a competitor. Which of the following practices should the manager implement to validate the concern?

A. Separation of duties
B. Mandatory vacations
C. Background checks
D. Security awareness training


Answer: A. Separation of duties

Computer Science & Information Technology

You might also like to view...

List the five functions that the EBK specifies for the evaluation function.

What will be an ideal response?

Computer Science & Information Technology

Selecting the ____ means selecting everything in the image outside of the current selection.

a. reverse b. obverse c. adverse d. inverse

Computer Science & Information Technology

Which of the following CSS3 properties configure the alignment of text within a table?

a. align b. caption c.text-align d. border-spacing

Computer Science & Information Technology

You create each item in an ordered list with the ____ element.

A. ol B. li C. ul D. it

Computer Science & Information Technology