a vulnerable process that is divided between two or more individuals to prevent fraudulent application of the process is known as which of the following?