Which of the following types of risk reducing policies also has the added indirect benefit of cross training e
Which of the following types of risk reducing policies also has the added indirect benefit of cross training
employees when implemented?
which of the following should be implemented?
In order to prevent and detect fraud, which of the following should be implemented?
Which of the following is the BEST method to prevent such activities in the future?
The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a database
administrator performing several other job functions within the company. Which of the following is the
BEST method to prevent such activities in the future?
which of the following?
Separation of duties is often implemented between developers and administrators in order to separate
which of the following?
Which of the following security controls will MOST likely be implemented within the company?
A user in the company is in charge of various financial roles but needs to prepare for an upcoming audit.
They use the same account to access each financial system. Which of the following security controls will
MOST likely be implemented within the company?
Which of the following concepts would enforce this process?
Everyone in the accounting department has the ability to print and sign checks. Internal audit has asked
that only one group of employees may print checks while only two other employees may sign the checks.
Which of the following concepts would enforce this process?
which of the following?
One of the system administrators at a company is assigned to maintain a secure computer lab. The
administrator has rights to configure machines, install software, and perform user account maintenance.
However, the administrator cannot add new computers to the domain, because that requires
authorization from the Information Assurance Officer. This is an example of which of the following?
Which of the following would be used to mitigate this issue so that only security administrators can make chan
A security administrator notices that a specific network administrator is making unauthorized changes to
the firewall every Saturday morning. Which of the following would be used to mitigate this issue so that
only security administrators can make changes to the firewall?
Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least privile
Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least
privilege principles?
Which of the following calculations would he security manager choose to determine total risk?
An IT security manager is asked to provide the total risk to the business. Which of the following
calculations would he security manager choose to determine total risk?