When reviewing an organization’s logical access security, which of the following should be of MOST
concern to an IS auditor?

A.
Passwords are not shared.
B.
Password files are not encrypted.
C.
Redundant logon IDs are deleted.
D.
The allocation of logon IDs is controlled.
Explanation:
When evaluating the technical aspects of logical security, unencrypted files represent the greatest
risk. The sharing of passwords, checking for the redundancy of logon IDs and proper logon ID
procedures are essential, but they are less important than ensuring that the password files are
encrypted.