List of questions
Question 24 - CRISC discussion
During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?
A.
Data validation
B.
Identification
C.
Authentication
D.
Data integrity
Your answer:
0 comments
Sorted by
Leave a comment first