Which of the following would be the MOST effective mitigating control when a legacy application does not have the capability to appropriately enforce separation of duties? A. Establish delegated authorities. B. Periodically validate user entitlements. C. Monitor transaction logs. D. Develop user access policies. Suggested Answer: B This question is in CRISC exam For getting Risk and Information Systems Control Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISACA. The website does not contain actual questions and answers from ISACA's Certification Exams. Trademarks, certification & product names are used for reference only and belong to ISACA.
Please login or Register to submit your answer