Question 296
Which of the following is MOST critical when creating data for testing the logic in a new or modified application system?
Question 297
An IS auditor discovers that developers have operator access to the command line of a production environment operating system. Which of the following controls would BEST mitigate the risk of undetected and unauthorized program changes to the production environment?
Question 298
In an online transaction processing system, data integrity is maintained by ensuring that a transaction is either completed in its entirety or not at all. This principle of data integrity is known as:
Question 299
An efficient use of public key infrastructure (PKI) should encrypt the:
Question 300
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's release management processes?