Which of the following security concepts establishes procedures where creation and approval are performed through distinct functions?

A. Discretionary access control
B. Job rotation
C. Separation of duties
D. Principle of least privilege


Answer: C. Separation of duties

Computer Science & Information Technology

You might also like to view...

To replace only the first match to a regular expression, you must pass as an argument to regex_replace.

a. -1 b. format_first_only c. replace_first_only d. 0

Computer Science & Information Technology

Navigate includes selecting the appropriate Social Media tools and creating an engagement plan. Which two process flows can you consider and how are they different?

What will be an ideal response?

Computer Science & Information Technology

Which type of social engineering attack depends on the user incorrectly entering a URL?

A. whaling B. vishing C. spear phishing D. typo squatting

Computer Science & Information Technology

What type of removable external storage do Android and some Microsoft mobile devices offer to upgrade the storage capacity of the device?

What will be an ideal response?

Computer Science & Information Technology