PrepAway - Latest Free Exam Questions & Answers

Which of the following are functions that are compatible in a properly segregated environment?

Which of the following are functions that are compatible in a properly segregated environment?

PrepAway - Latest Free Exam Questions & Answers

A.
Security administration and quality assurance

B.
Security administration and data entry

C.
Security administration and application programming

D.
Application programming and data entry

Explanation:
Security Administration and Quality Assurance are the most similar tasks.
Administrative Management: Administrative management is a very important piece of operational
security. One aspect of administrative management is dealing with personnel issues. This includes
separation of duties and job rotation. The objective of separation of duties is to ensure that one
person acting alone cannot compromise the company’s security in any way. High-risk activities
should be broken up into different parts and distributed to different individuals. This way the
company does not need to put a dangerously high level of trust on certain individuals and if fraud
were to take place, collusion would need to be committed, meaning more than one person would
have to be involved in the fraudulent activity.
Separation of duties also helps to prevent many different types of mistakes that can take place if
one person is performing a task from the beginning to the end. For instance, a programmer should
not be the one to test her own code. A different person with a different job and agenda should
perform functionality and integrity testing on the programmer’s code because the programmer may
have a focused view of what the program is supposed to accomplish and only test certain
functions, input values, and in certain environments.
Another example of separation of duties is the difference between the functions of a computer
operator versus the functions of a system administrator. There must be clear cut lines drawn
between system administrator duties and computer operator duties. This will vary from
environment to environment and will depend on the level of security required within the
environment. The system administrators usually have responsibility of performing backups and
recovery procedures, setting permissions, adding and removing users, setting user clearance, and
developing user profiles. The computer operator on the other hand, may be allowed to install

software, set an initial password, alter desktop configurations, and modify certain system
parameters. The computer operator should not be able to modify her own security profile, add and
remove users globally, or set user security clearance. This would breach the concept of separation
of duties.
Pg 808-809 Shon Harris: All-In-One CISSP Certification


Leave a Reply