Which of the following policies requires that every employee be able to perform the work of at least one other staff member?

A. collusion
B. job rotation
C. two-person control
D. separation of duties


Answer: B

Computer Science & Information Technology

You might also like to view...

What are the benefits and drawbacks of IPsec tunneling mode and IPsec transport mode?

What will be an ideal response?

Computer Science & Information Technology

A technique used to compromise a system is known as a(n) __________.

A. threat B. attackĀ  C. exploit D. vulnerability

Computer Science & Information Technology

Describe a situation in which you would want to access the VBA editor.

What will be an ideal response?

Computer Science & Information Technology

Contrast the source program library (SPL) management system to the database management system (DBMS).

What will be an ideal response?

Computer Science & Information Technology