One of the best practices for access control is _______, which requires that if the fraudulent application of a process might potentially result in a breach of security, the process should be divided between two or more individuals.

One of the best practices for access control is _______, which requires that if the fraudulent application of a process might potentially result in a breach of security, the process should be divided between two or more individuals.



a. job rotation
b. mandatory vacation
c. separation of duties
d. least privilege





Answer: C


Learn More :

Network Security

Learn More Multiple Choice Question :