Watch this video on YouTube
Which of the following is the MOST effective way to implement dual control for sensitive data access?