Security MCQ
Network Security
One of the best practices for access control is _______, which requires that if the fraudulent application of a process might potentially result in a breach of security, the process should be divided between two or more individuals.
One of the best practices for access control is _______, which requires that if the fraudulent application of a process might potentially result in a breach of security, the process should be divided between two or more individuals.
One of the best practices for access control is _______, which requires that if the fraudulent application of a process might potentially result in a breach of security, the process should be divided between two or more individuals.
a. job rotation
b. mandatory vacation
c. separation of duties
d. least privilege
Answer: C
Learn More :