ExamGecko
Question list
Search
Search

Related questions

Question 986 - CISA discussion

Report
Export

During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?

A.
System administrators should ensure consistency of assigned rights.
Answers
A.
System administrators should ensure consistency of assigned rights.
B.
IT security should regularly revoke excessive system rights.
Answers
B.
IT security should regularly revoke excessive system rights.
C.
Human resources (HR) should delete access rights of terminated employees.
Answers
C.
Human resources (HR) should delete access rights of terminated employees.
D.
Line management should regularly review and request modification of access rights
Answers
D.
Line management should regularly review and request modification of access rights
Suggested answer: D

Explanation:

The best recommendation for the auditor to make is D. Line management should regularly review and request modification of access rights.Access rights are the permissions and privileges granted to users to access, view, modify, or delete data or resources on a system or network1.Excessive rights are access rights that are not necessary or appropriate for a user's role or function, and may pose a risk of unauthorized or inappropriate use of data or resources2.Therefore, it is important to ensure that access rights are aligned with the principle of least privilege, which means that users should only have the minimum level of access required to perform their duties2.

Line management is responsible for overseeing and supervising the activities and performance of their staff, and ensuring that they comply with the organization's policies and standards3. Therefore, line management should regularly review and request modification of access rights for their staff, as they are in the best position to:

Understand the roles and functions of their staff, and determine the appropriate level of access rights needed for them to perform their duties effectively and efficiently.

Monitor and evaluate the usage and behavior of their staff, and identify any changes or anomalies that may indicate excessive or inappropriate access rights.

Communicate and collaborate with IT security or system administrators, who are responsible for granting, revoking, or modifying access rights, and request any necessary adjustments or corrections.

asked 18/09/2024
James Valdivia
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first