Q) Which of the following functions to be performed by application owners to ensure adequate separation between IS and end-users?
a) Analysis of the system
b) Approval of access to information
d) Data Management
Q) The responsibility for maintaining adequate security for information assets in real time with:
a) Security Manager
b) System administrator
c) data and the owner of the system.
d) group operation system.
Q) The main risk for the end user has access to a database on the system level, rather than the application is that users can:
a) making unauthorized changes to the database directly, without an audit trail.
b) To use a system query language (SQL) to access information.
c) Remote access to the database.
d) Update without authentication.
Q) To determine who has received permission to use a particular resource system needs an auditor is reviewing:
a) lists activities
b) The access control lists.
c) lists login ID
d) password lists.