Notifications
Clear all
Topic starter
14/07/2022 4:46 am
A security analyst received an email with the following key:
Xj3XJ3LLc
A second security analyst received an email with following key:
3XJ3xjcLLC
The security manager has informed the two analysts that the email they received is a key that allows access to the company’s financial segment for maintenance.
This is an example of:
- A . dual control
- B . private key encryption
- C . separation of duties
- D . public key encryption
- E . two-factor authentication
Suggested Answer: A