Which of the following would be of MOST concern during an audit of an end user computing system containing sensitive information?

Posted by: Pdfprep Category: CISA Tags: , ,

Which of the following would be of MOST concern during an audit of an end user computing system containing sensitive information?
A . Audit logging is not available.
B . System data is not protected.
C . Secure authorization is not available.
D . The system is not included in inventory.

Answer: B

Leave a Reply

Your email address will not be published.