Multiple Choice
There are a number of reasons that all access to an IT system be logged.Which of the following is not one of the reasons for the log to be maintained?
A) Any login or use abnormalities can be examined in more detail to determine any weaknesses in the login procedures.
B) A user cannot deny any particular act that he or she did on the system.
C) To establish nonrepudiation of sales transactions by a customer.
D) To establish a user profile.
Correct Answer:

Verified
Correct Answer:
Verified
Q50: This type of software should be used
Q51: Two or more computer network or data
Q52: An IT governance committee has several responsibilities.Which
Q53: All of the following are general controls
Q54: This should be established for every authorized
Q56: This type of input validation check examines
Q57: This table contains a list of valid,
Q58: Which programmed input validation makes sure that
Q59: Which of the following is not a
Q60: Unauthorized access to the operating system would