Notifications
Clear all
Topic starter
A security analyst received an email with the following key:
Xj3XJ3LLc
A second security analyst received an email with following key:
3XJ3xjcLLC
The security manager has informed the two analysts that the email they received is a key that allows access to the company’s financial segment for maintenance.
This is an example of:
- A . dual control
B. private key encryption
C. separation of duties
D. public key encryption
E. two-factor authentication
Suggested Answer: A
Posted : 16/02/2023 1:22 am