An internal auditor is concerned with privilege creep that is associated with transfers inside the company. Which mitigation measure would detect and correct this?

A. User rights reviews
B. Least privilege and job rotation
C. Change management
D. Change Control


Answer: A. User rights reviews

Computer Science & Information Technology

You might also like to view...

Worksheet labels are the column letters and row numbers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What happens if a button symbol has an empty keyframe in its Up state but filled keyframes in its Over, Down, and Hit states?

What will be an ideal response?

Computer Science & Information Technology

Alice would like to add another object to a security model and grant herself rights to that object. Which one of the rules in the Take-Grant protection model would allow her to complete this operation?

A. Take rule B. Grant rule C. Create rule D. Remove rule

Computer Science & Information Technology

The components of a server include all of the following EXCEPT: ______.

A. processors B. storage C. memory D. high-end graphics displays

Computer Science & Information Technology