To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should recommend:
Which of the following is the PRIMARY safeguard for securing software and data within an information processing facility?
Which of the following is the PRIMARY safeguard for securing software and data within an information processing facility?
When reviewing an organization’s logical access security, which of the following should be of MOST concern to an IS auditor?
When reviewing an organization’s logical access security, which of the following should be of MOST concern to an IS auditor?
When performing an audit of access rights, an IS auditor should be suspicious of which of the following if allocated to a computer operator?