PrepAway - Latest Free Exam Questions & Answers

To determine which users can gain access to the privileged supervisory state, which of the following should an

To determine which users can gain access to the privileged supervisory state, which of the following should an IS auditor review?

PrepAway - Latest Free Exam Questions & Answers

A.
System access log files

B.
Enabled access control software parameters

C.
Logs of access control violations

D.
System configuration files for control options used

Explanation:
A review of system configuration files for control options used would show which users have access to the privileged supervisory state. Both systems access log files and logs of access violations are detective in nature. Access control software is run under the operating system.

One Comment on “To determine which users can gain access to the privileged supervisory state, which of the following should an


Leave a Reply