Question 171
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Question 172
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Question 173
What is the BEST control to address SQL injection vulnerabilities?
Question 174
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
Question 175
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not: