A security analyst received an email with the following key:
Xj3XJ3LLc
A second security analyst received an email with following key:
3XJ3xjcLLC
The security manager has informed the two analysts that the email they received is a key that allows access to the company’s financial segment for maintenance.
This is an example of:
A . dual control
B . private key encryption
C . separation of duties
D . public key encryption
E . two-factor authentication
Answer: A