ExamGecko
Question list
Search
Search

Related questions

Question 207 - CISA discussion

Report
Export

Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?

A.
Implementing two-factor authentication
Answers
A.
Implementing two-factor authentication
B.
Restricting access to transactions using network security software
Answers
B.
Restricting access to transactions using network security software
C.
implementing role-based access at the application level
Answers
C.
implementing role-based access at the application level
D.
Using a single menu tor sensitive application transactions
Answers
D.
Using a single menu tor sensitive application transactions
Suggested answer: C

Explanation:

The best way to ensure payment transaction data is restricted to the appropriate users is implementing role-based access at the application level. Role-based access is a method of access control that assigns permissions or privileges to users based on their roles or functions within an organization or system. Role-based access can help ensure that payment transaction data is restricted to the appropriate users, by allowing only authorized users who have a legitimate need or purpose to access or use the payment transaction data, and preventing unauthorized or unnecessary access or use by other users. Implementing two-factor authentication is a possible way to enhance the security and verification of user identities, but it is not the best way to ensure payment transaction data is restricted to the appropriate users, as it does not define what permissions or privileges users have on the payment transaction data. Restricting access to transactions using network security software is a possible way to protect the network communication and transmission of payment transaction data, but it is not the best way to ensure payment transaction data is restricted to the appropriate users, as it does not specify what actions or operations users can perform on the payment transaction data. Using a single menu for sensitive application transactions is a possible way to simplify the user interface and navigation of payment transaction data, but it is not the best way to ensure payment transaction data is restricted to the appropriate users, as it does not limit what users can access or use the payment transaction data.

asked 18/09/2024
Andrew Staton
26 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first