List of questions
Related questions
Question 922 - CISA discussion
An IS auditor wants to inspect recent events in a system to observe failed authentications and password changes. Which of the following is the MOST appropriate method to use for this purpose?
A.
Penetration testing
B.
Authenticated scanning
C.
Change management records
D.
System log review
Your answer:
0 comments
Sorted by
Leave a comment first