A vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as which of the following?
A. separation of duties
B. process sharing
C. mandatory splitting
D. role reversal
Answer: A
You might also like to view...
When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as
a. impersonation theft. c. identity theft. b. scareware theft. d. malware theft.
Which query would you use to show the sales by region for each of four quarters?
A) Crosstab B) Summary C) Find duplicates D) Find unmatched
What is the best practice for centering a title over multiple columns?
A) Use the Merge Title feature B) Enter the title in the center column of the range C) Use the Combine and Center alignment D) Use the Merge and Center alignment
Case-Based Critical Thinking QuestionsCase 2-1Kathy is having a difficult time understanding task dependencies, but in her new role as production manager, she will have to learn them in order to build production schedules for all of the projects that her team produces, so she turns to her colleague Amber for help. Amber suggests that the best way to teach Kathy is to give her some illustrative examples.As a final example, Amber asks Kathy to suppose that she is producing a new theatrical performance. She might start selling tickets for the performances while the show is being rehearsed, but she doesn't want to stop selling tickets until the show is ready to go on. If the show is not ready, she can keep selling tickets, but when the show is ready to go on, the ticket windows closes, and
that task can finish. Of which kind of dependency is this an example? A. Start-to-Finish B. Start-to-Start C. Finish-to-Finish D. Finish-to-Start