IT control objectives are useful to IT auditors as they provide the basis for understanding the:
Which represents PROPER separation of duties in the corporate environment?
Which of the following is the BEST security control for reducing the threat of phishing attacks?
Creating a secondary authentication process for network access would be an example of?