An audit has revealed that database administrators are also responsible for auditing database changes and backup logs.Which of the following access control methodologies would BEST mitigate this concern?

A. Time of day restrictions
B. Principle of least privilege
C. Role-based access control
D. Separation of duties


Answer: D. Separation of duties

Computer Science & Information Technology

You might also like to view...

Which statement about trees is false?

a) A tree is a nonlinear, two-dimensional data structure. b) Each node in a tree must contain two links. c) Children of the same node are called siblings. d) A node with no children is called a leaf node.

Computer Science & Information Technology

________ are devices that transfer packets of data between two or more networks

Fill in the blank(s) with correct word

Computer Science & Information Technology

One advantage to benchmarking is that best practices change very little over time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ are software systems that make using computers more convenient or users, application developers and system administrators.

a) Operating systems b) Applications c) GUIs d) None of the above.

Computer Science & Information Technology