IS auditors, in performing detailed network assessments and
access control reviews should FIRST:

A. determine the points of entry.

B. evaluate users access authorization.

C. assess users identification and authorization.

D. evaluate the domain-controlling server configuration.

Answer Posted / guest

Answer: A

In performing detailed network assessments and access
control reviews IS auditors should first determine the
points of entry to the system and accordingly review the
points of entry for appropriate controls. Evaluation of user
access authorization, assessment of user identification and
authorization and evaluation of the domain-controlling
server configuration are all implementation issues for
appropriate controls for the points of entry.

Is This Answer Correct ?    5 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

purchase orders issued to vendors have been authorized as per the authorization matrix

1095


WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2847