What security control may be used to implement a concept known as two-person control?
A. Mandatory vacation
B. Separation of duties
C. Least privilege
D. Defense in depth
Answer: B. Separation of duties
You might also like to view...
The ________ module examines violation events and, depending on event type, either automatically invokes the policy enforcer or sends an action request to the network manager.
A) Traffic monitor B) Policy checker C) Event handler D) Topology manager
For a one-variable data table, you must specify both the row input cell and column input cell from the original data set
Indicate whether the statement is true or false.
Which traversal type guides visits to items in the tree from left to right through the levels of the tree?
A. levelorder B. inorder C. preorder D. postorder
What is a base case?
What will be an ideal response?