Which of the following would be considered a corrective control when designing the security of a data center?
An IS auditor seeks assurance that a new process for purging transactions does not have a detrimental
impact on the integrity of a database. This could be achieved BEST by analyzing the:
Which of the following is the MOST effective way to reduce risk to an organization from widespread use of unauthorized web-based communication technologies?