Which of the following IT controls would best prevent a developer from inappropriately accessing the system?
A) Forced password changes.
B) Secondary code review.
C) Symmetric encryption.
D) Lack of authentication.
Correct Answer:
Verified
Q25: A disaster recovery approach should include which
Q26: Select a correct statement regarding encryption methods?
A)To
Q27: Select a correct statement regarding a hashing
Q28: Which of the following controls would most
Q29: Which of the following statements about asymmetric-key
Q31: Which of the following is not included
Q32: What is the primary objective of data
Q33: When computer programs or files can be
Q34: Why would companies want to use digital
Q35: To prevent invalid data input,a bank added
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents