ISC Exam Questions

Which of the following security procedures forces an operator into collusion with an operator of a d

Which of the following security procedures forces an operator into collusion with an operator of a different category in order to access unauthorized data?

A.
Enforcing regular password changes

B.
Management monitoring of audit logs

C.
Limiting the specific access of operations personnel

D.
Job rotation of people through different assignments

Explanation:
By limiting the specific accesses of operations personnel, an
organization is enforcing separation of duties, and collusion would be needed to
have access to unauthorized data.