Data items to capture for a security audit trail include:

A. events related to the security mechanisms on the system
B. operating system access
C. remote access
D. all of the above


D

Business

You might also like to view...

Which of the following statements about how women buy cars today is most accurate?

A. For women, safety is about features that would help survive an accident. B. When it comes to the actual purchase process, women are more adept negotiators than men. C. Women have definite likes or dislikes when buying a car, but they don't feel comfortable expressing their opinions. D. Women care more about exterior styles and lines and men are more concerned with cargo space and gas mileage. E. Women usually shop one dealership before making a decision and men usually shop three.

Business

The REA model is an alternative accounting framework for modeling an organization's critical resources, events, and accounts

Indicate whether the statement is true or false

Business

Which value framework operate from a framework that is ethnocentric, competition based and focused on narrowly defined financial and national interest?

a. Inclusive b. Exclusionary c. Exclusive d. Restrictive

Business

Which of the following is true about managing relationships with service providers?

a. The outsourcing of services performed in-house to third-party service providers does not require any changes in the organizational structure. b. A company’s IT infrastructure must be reconfigured to monitor and manage the network of third-party service providers. c. The outsourcing of services does not require buying companies to develop multisourcing strategies. d. Managing a service provider is fairly simple and straightforward.

Business