List of questions
Related questions
Question 825 - CRISC discussion
When of the following is the MOST significant exposure when an application uses individual user accounts to access the underlying database?
A.
Users may share accounts with business system analyst
B.
Application may not capture a complete audit trail.
C.
Users may be able to circumvent application controls.
D.
Multiple connects to the database are used and slow the process
Your answer:
0 comments
Sorted by
Leave a comment first