Which of the following policies requires that every employee be able to perform the work of at least one other staff member?
A. collusion
B. job rotation
C. two-person control
D. separation of duties
Answer: B
Computer Science & Information Technology
You might also like to view...
What are the benefits and drawbacks of IPsec tunneling mode and IPsec transport mode?
What will be an ideal response?
Computer Science & Information Technology
A technique used to compromise a system is known as a(n) __________.
A. threat B. attackĀ C. exploit D. vulnerability
Computer Science & Information Technology
Describe a situation in which you would want to access the VBA editor.
What will be an ideal response?
Computer Science & Information Technology
Contrast the source program library (SPL) management system to the database management system (DBMS).
What will be an ideal response?
Computer Science & Information Technology