The IS auditor’s PRIMARY concern should be that:
Which of the following is a general operating system access control function?
Which of the following BEST restricts users to those functions needed to perform their duties?
For a discretionary access control to be effective, it must:
Ofthe following, which is the BEST control against this risk?
From a control perspective, the PRIMARY objective of classifying information assets is to: