When auditors examine and test the call-back feature, they are testing which audit objective?

A. incompatible functions have been segregated
B. application programs are protected from unauthorized access
C. physical security measures are adequate to protect the organization from natural disaster
D. illegal access to the system is prevented and detected


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following data types only allows one of two possible values to be assigned?

a) char b) int c) boolean d) float e) long

Computer Science & Information Technology

Which of the following types of communications tools is used for chat rooms?

A. Public Asynchronous B. Private Asynchronous C. Public Synchronous D. Private Synchronous

Computer Science & Information Technology

Explain how to customize the Quick Access Toolbar.

What will be an ideal response?

Computer Science & Information Technology

What type of port scan has the FIN, PSH, and URG flags set?

A. NULL scan B. connect scan C. XMAS scan D. ACK scan

Computer Science & Information Technology