Question 171

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
  • Question 172

    An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
  • Question 173

    What is the BEST control to address SQL injection vulnerabilities?
  • Question 174

    Which of the following is the BEST detective control for a job scheduling process involving data transmission?
  • Question 175

    During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not: