The BEST way to validate whether a malicious act has actually occurred in an application is to review:

The BEST way to validate whether a malicious act has actually occurred in an application is to review:
A . segregation of duties
B . access controls
C . activity logs
D . change management logs

Answer: C

Latest CISA Dumps Valid Version with 2694 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments