The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a database administrator performing several other job functions within the company. Which of the following is the BEST method to prevent such activities in the future?

A. Job rotation
B. Separation of duties
C. Mandatory Vacations
D. Least Privilege


Answer: B. Separation of duties

Computer Science & Information Technology

You might also like to view...

Programmers commonly use ____________ in their code to create a sense of visual organization.

a. different font colors b. documentation comments c. blank lines and indentation d. bold images, such as photos

Computer Science & Information Technology

A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An access, an insertion, or a removal of a node in vine-like tree with N nodes and a height of N - 1 would be linear in the worst case.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ is a type of solid-state (microchip) technology in which there are no moving parts.

A. Flash memory B. Sled C. Mini PCI D. Type II PC card

Computer Science & Information Technology