Which of the following policies makes it difficult for an individual to violate InfoSec and is quite useful in monitoring financial affairs?

A. task rotation
B. mandatory vacations
C. separation of duties
D. job rotation


Answer: C

Computer Science & Information Technology

You might also like to view...

Observe the number of packets that are exchanged between the Linux PCs for each keystroke? Observe how the transmission of packets changes when you type characters more quickly.

What will be an ideal response?

Computer Science & Information Technology

Show how to return the store allocated by this statement to the heap manager for reallocation.

Given the type definitions: ``` const int STRING_SIZE = 20; struct ListNode { char item[STRING_SIZE]; int count; ListNode * link; }; ListNode *head = new ListNode[10]; ```

Computer Science & Information Technology

__________ are awarded based on successful completion of an exam that verifies your level of knowledge about a particular technology or subject.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following devices is not considered a peripheral device?

a) printer b) DVD drive c) mainboard d) hard disk drive

Computer Science & Information Technology