Correct Answer: Separation of duties and job rotation
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Cyber Security Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Cyber Security MCQ Questions
During a penetration test, you find a file containing hashed passwords for the system you are attempting to breach. Which type of attack is most likely to succeed in accessing the hashed passwords in a reasonable amount of time?
You configure an encrypted USB drive for a user who needs to deliver a sensitive file at an in-person meeting. What type of encryption is typically used to encrypt the file?
What is the difference between DRP and BCP
Which aspect of cybersecurity do Distributed Denial of Service (DDoS) attacks affect the most?
You need to recommend a solution to automatically assess your cloud-hosted VMs against CIS benchmarks to identify deviations from security best practices. What type of solution should you recommend?
Which security control scheme do vendors often submit their products to for evaluation, to provide an independent view of product assurance?
There are four possible treatments once an assessment has identified a risk. Which risk treatment implements controls to reduce risk?
You have implemented controls to mitigate the threats, vulnerabilities, and impact to your business. Which type of risk is left over?
Which organization, established by NIST in 1990, runs workshops to foster coordination in incident prevention, stimulate rapid reaction to incidents, and allow experts to share information?
NIST SP 800-53 is one of two important control frameworks used in cybersecurity. What is the other one?