Which of the following security procedures forces an operator into collusion with an operator of a different category in order to access unauthorized data?
________________________ provides continuous online backup functionality. It combines hard disk technology with the cheaper and slower optical or tape jukeboxes.
Which of the following is less likely to help in assessing identification and authentication controls?