ExamGecko
Question list
Search
Search

Related questions

Question 368 - CISA discussion

Report
Export

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

A.
Apply single sign-on for access control
Answers
A.
Apply single sign-on for access control
B.
Implement segregation of duties.
Answers
B.
Implement segregation of duties.
C.
Enforce an internal data access policy.
Answers
C.
Enforce an internal data access policy.
D.
Enforce the use of digital signatures.
Answers
D.
Enforce the use of digital signatures.
Suggested answer: C

Explanation:

The most appropriate control to prevent unauthorized retrieval of confidential information stored in a business application system is to enforce an internal data access policy. A data access policy defines who can access what data, under what conditions and for what purposes. It also specifies the roles and responsibilities of data owners, custodians and users, as well as the security measures and controls to protect data confidentiality, integrity and availability. By enforcing a data access policy, the organization can ensure that only authorized personnel can retrieve confidential information from the business application system. Applying single sign-on for access control, implementing segregation of duties and enforcing the use of digital signatures are also useful controls, but they are not sufficient to prevent unauthorized data retrieval without a clear and comprehensive data access policy.Reference:

CISA Review Manual, 27th Edition, page 2301

CISA Review Questions, Answers & Explanations Database - 12 Month Subscription2

asked 18/09/2024
Robeena Meer
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first