A manager suspects that an IT employee with elevated database access may be knowingly modifying financial transactions for the benefit of a competitor. Which of the following practices should the manager implement to validate the concern?
A. Separation of duties
B. Mandatory vacations
C. Background checks
D. Security awareness training
Answer: A. Separation of duties
Computer Science & Information Technology
You might also like to view...
List the five functions that the EBK specifies for the evaluation function.
What will be an ideal response?
Computer Science & Information Technology
Selecting the ____ means selecting everything in the image outside of the current selection.
a. reverse b. obverse c. adverse d. inverse
Computer Science & Information Technology
Which of the following CSS3 properties configure the alignment of text within a table?
a. align b. caption c.text-align d. border-spacing
Computer Science & Information Technology
You create each item in an ordered list with the ____ element.
A. ol B. li C. ul D. it
Computer Science & Information Technology