PdfPrep.com

A security analyst received an email with the following key:

A security analyst received an email with the following key:

Xj3XJ3LLc

A second security analyst received an email with following key:

3XJ3xjcLLC

The security manager has informed the two analysts that the email they received is a key that allows access to the company’s financial segment for maintenance.

This is an example of:
A . dual control
B . private key encryption
C . separation of duties
D . public key encryption
E . two-factor authentication

Answer: A

Exit mobile version