Question 357:
Which of the following is the MOST effective mitigation strategy to protect confidential information from insider threats?
Answer options:
A. Performing an entitlement review process B. Implementing authentication mechanisms C. Defining segregation of duties D. Establishing authorization controls