What security control may be used to implement a concept known as two-person control?

A. Mandatory vacation
B. Separation of duties
C. Least privilege
D. Defense in depth


Answer: B. Separation of duties

Computer Science & Information Technology

You might also like to view...

The ________ module examines violation events and, depending on event type, either automatically invokes the policy enforcer or sends an action request to the network manager.

A) Traffic monitor B) Policy checker C) Event handler D) Topology manager

Computer Science & Information Technology

For a one-variable data table, you must specify both the row input cell and column input cell from the original data set

Indicate whether the statement is true or false.

Computer Science & Information Technology

Which traversal type guides visits to items in the tree from left to right through the levels of the tree?

A. levelorder B. inorder C. preorder D. postorder

Computer Science & Information Technology

What is a base case?

What will be an ideal response?

Computer Science & Information Technology