Question 641
A financial institution suspects that a manager has been crediting customer accounts without authorization. Which of the following is the MOST effective method to validate this concern?
Question 642
An organization decides to establish a formal incident response capability with clear roles and responsibilities facilitating centralized reporting of security incidents. Which type of control is being implemented?
Question 643
In a client-server system, which of the following control techniques is used to inspect activity from known or unknown users?
Question 644
An organization has contracted with a vendor for a turnkey solution for their electronic toll collection system (ETCS). The vendor has provided its proprietary application software as part of the solution. The contract should require that:
Question 645
.Proper segregation of duties prohibits a system analyst from performing quality-assurance functions. True or false?