ExamGecko
Question list
Search
Search

Related questions

Question 200 - CISA discussion

Report
Export

The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:

A.
the access control system's log settings.
Answers
A.
the access control system's log settings.
B.
how the latest system changes were implemented.
Answers
B.
how the latest system changes were implemented.
C.
the access control system's configuration.
Answers
C.
the access control system's configuration.
D.
the access rights that have been granted.
Answers
D.
the access rights that have been granted.
Suggested answer: D

Explanation:

The best way to determine whether programmers have permission to alter data in the production environment is by reviewing the access rights that have been granted. Access rights are permissions or privileges that define what actions or operations a user can perform on an information system or resource. By reviewing the access rights that have been granted to programmers, an IS auditor can verify whether they have been authorized to modify data in the production environment, which is where live data and applications are stored and executed. The access control system's log settings are parameters that define what events or activities are recorded by the access control system, which is a system that enforces the access rights and policies of an information system or resource. The access control system's log settings are not the best way to determine whether programmers have permission to alter data in the production environment, as they do not indicate what permissions or privileges have been granted to programmers. How the latest system changes were implemented is a process that describes how software updates or modifications are deployed to the production environment. How the latest system changes were implemented is not the best way to determine whether programmers have permission to alter data in the production environment, as it does not indicate what permissions or privileges have been granted to programmers. The access control system's configuration is a set of rules or parameters that define how the access control system operates and functions. The access control system's configuration is not the best way to determine whether programmers have permission to alter data in the production environment, as it does not indicate what permissions or privileges have been granted to programmers.

asked 18/09/2024
Sriharsha Janga
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first