What should the IS auditor do next?
During an audit of the logical access control of an ERP financial system an IS auditor found some user
accounts shared by multiple individuals. The user IDs were based on roles rather than individual identities.
These accounts allow access to financial transactions on the ERP. What should the IS auditor do next?
The responsibility for authorizing access to applicatio…
The responsibility for authorizing access to application data should be with the:
The responsibility for authorizing access to applicatio…
The responsibility for authorizing access to application data should be with the:
Which of the following is the BEST method for preventin…
Which of the following is the BEST method for preventing the leakage of confidential information in a laptop
computer?
which of the following would BEST protect against ident…
In an online banking application, which of the following would BEST protect against identity theft?
which of the following would BEST protect against ident…
In an online banking application, which of the following would BEST protect against identity theft?
Which of the following is the MOST appropriate approach…
After reviewing its business processes, a large organization is deploying a new web application based on a
VoIP technology. Which of the following is the MOST appropriate approach for implementing access control
that will facilitate security management of the VoIP web application?
Which of the following would prevent unauthorized chang…
Which of the following would prevent unauthorized changes to information stored in a server’s log?
Which of the following would prevent unauthorized chang…
Which of the following would prevent unauthorized changes to information stored in a server’s log?
Inadequate programming and coding practices introduce t…
Inadequate programming and coding practices introduce the risk of: