The BEST way to validate whether a malicious act has actually occurred in an application is to review:

Posted by: Pdfprep Category: CISA Tags: , ,

The BEST way to validate whether a malicious act has actually occurred in an application is to review:
A . segregation of duties
B . access controls
C . activity logs
D . change management logs

Answer: C

Leave a Reply

Your email address will not be published.