To determine who has been given permission to use a particular system resource, an IS auditor should review:

To determine who has been given permission to use a particular system resource, an IS auditor
should review:

To determine who has been given permission to use a particular system resource, an IS auditor
should review:

A.
activity lists.

B.
access control lists.

C.
logon ID lists.

D.
password lists.

Explanation:

Access control lists are the authorization tables that document the users who have been given
permission to use a particular system resource and the types of access they have been granted.
The other choices would not document who has been given permission to use (access) specific
system resources.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

15 − 13 =