Which of the following is the BEST method to prevent su…
The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a database
administrator performing several other job functions within the company. Which of the following is the BEST
method to prevent such activities in the future?
which of the following should be implemented?
In order to prevent and detect fraud, which of the following should be implemented?
Which of the following types of risk reducing policies …
Which of the following types of risk reducing policies also has the added indirect benefit of cross training
employees when implemented?
Which of the following practices is being implemented?
A software developer is responsible for writing the code on an accounting application. Another software
developer is responsible for developing code on a system in human resources. Once a year they have to switch
roles for several weeks.
Which of the following practices is being implemented?
Which of the following would be the BEST course of action?
The Chief Security Officer (CSO) is concerned about misuse of company assets and wishes to determine who
may be responsible. Which of the following would be the BEST course of action?
Which of the following controls would BEST mitigate thi…
A company is looking to reduce the likelihood of employees in the finance department being involved with
money laundering. Which of the following controls would BEST mitigate this risk?
Which of the following should Joe, a security manager, …
Which of the following should Joe, a security manager, implement to reduce the risk of employees working in
collusion to embezzle funds from his company?
Which of the following controls has a company that has …
Which of the following controls has a company that has implemented a mandatory vacation policy?
While rarely enforced, mandatory vacation policies are …
While rarely enforced, mandatory vacation policies are effective at uncovering:
Mandatory vacations are a security control which can be…
Mandatory vacations are a security control which can be used to uncover the following: