An IS auditor examining a biometric user authentication system establishes the existence of a control
weakness that would allow an unauthorized individual to update the centralized database on the server that
is used to store biometric templates. Of the following, which is the BEST control against this risk?
the use of a cloud service provider to obtain additional computing power needed tor software development and testing Which of the following service models is MOST appropriate in tins situation?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
.Which of the following BEST characterizes a mantrap or deadman door, which is used as a deterrent control for the vulnerability of piggybacking?
In a small organization, an employee performs computer operations and, when the situation demands, program modifications. Which of the following should the IS auditor recommend?