ExamGecko
Question list
Search
Search

Related questions











Question 736 - CISA discussion

Report
Export

Which of the following controls is BEST implemented through system configuration?

A.
Network user accounts for temporary workers expire after 90 days.
Answers
A.
Network user accounts for temporary workers expire after 90 days.
B.
Application user access is reviewed every 180 days for appropriateness.
Answers
B.
Application user access is reviewed every 180 days for appropriateness.
C.
Financial data in key reports is traced to source systems for completeness and accuracy.
Answers
C.
Financial data in key reports is traced to source systems for completeness and accuracy.
D.
Computer operations personnel initiate batch processing jobs daily.
Answers
D.
Computer operations personnel initiate batch processing jobs daily.
Suggested answer: A

Explanation:

This control is best implemented through system configuration because it can be enforced automatically by setting a parameter in the network operating system or directory service.This ensures that temporary workers do not have access to the network beyond their authorized period, and reduces the risk of unauthorized or malicious use of their accounts12.

Reference 1: Configuration and Change Management - CISA 2: What is IT Governance? - Definition from Techopedia

asked 18/09/2024
rene laas
49 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first