Which of the following is the GREATEST risk of an inadequate policy definition for ownership of data and systems?
Submitted by: Administrator1. User management coordination does not exist.
2. Specific user accountability cannot be established.
3. Unauthorized users may have access to originate, modify or delete data.
4. Audit recommendations may not be implemented.
Answer: C
Submitted by: Administrator
2. Specific user accountability cannot be established.
3. Unauthorized users may have access to originate, modify or delete data.
4. Audit recommendations may not be implemented.
Answer: C
Submitted by: Administrator
Read Online CISA Job Interview Questions And Answers
Top CISA Questions
☺ | An IS auditor is performing an audit of a network operating system. Which of the following is a user feature the IS auditor should review? |
☺ | Which of the following is the MOST effective control when granting temporary access to vendors? |
☺ | While designing the business continuity plan (BCP) for an airline reservation system, the MOST appropriate method of data transfer/backup at an offsite location would be: |
☺ | Which of the following cryptography options would increase overhead/cost? |
☺ | IT control objectives are useful to IS auditors, as they provide the basis for understanding the: |
Top IT (Information Technology) Categories
☺ | Computer Operator Interview Questions. |
☺ | Telecommunications Interview Questions. |
☺ | Information Technology Interview Questions. |
☺ | Data Entry Interview Questions. |
☺ | IT Support Interview Questions. |