When reviewing an organization's logical access security,
which of the following would be of the MOST concern to an IS
auditor?

A. Passwords are not shared.

B. Password files are encrypted.

C. Redundant logon IDs are deleted.

D. The allocation of logon IDs is controlled.

Answer Posted / guest

Answer: B

When evaluating the technical aspects of logical security,
unencrypted files represent the greatest risk. The sharing
of passwords, checking for the redundancy of logon ids, and
proper logon ID procedures are essential, but they are less
important than ensuring that the password files are encrypted.

Is This Answer Correct ?    5 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

purchase orders issued to vendors have been authorized as per the authorization matrix

1084


WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2829