An audit has revealed that database administrators are also responsible for auditing database changes and backup logs.Which of the following access control methodologies would BEST mitigate this concern?
A. Time of day restrictions
B. Principle of least privilege
C. Role-based access control
D. Separation of duties
Answer: D. Separation of duties
You might also like to view...
Which statement about trees is false?
a) A tree is a nonlinear, two-dimensional data structure. b) Each node in a tree must contain two links. c) Children of the same node are called siblings. d) A node with no children is called a leaf node.
________ are devices that transfer packets of data between two or more networks
Fill in the blank(s) with correct word
One advantage to benchmarking is that best practices change very little over time.
Answer the following statement true (T) or false (F)
________ are software systems that make using computers more convenient or users, application developers and system administrators.
a) Operating systems b) Applications c) GUIs d) None of the above.