Related questions
Question 79 - IIA-CIA-Part3 discussion
Which of the following is a sound network configuration practice to enhance information security?
A.
Change management practices to ensure operating system patch documentation is retained.
B.
User role requirements are documented in accordance with appropriate application-level control needs.
C.
Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.
D.
Interfaces reinforce segregation of duties between operations administration and database development.
Your answer:
0 comments
Sorted by
Leave a comment first