which of the following vulnerabilities?

Prev Question
Next Question

When reviewing print systems spooling, an IS auditor is MOST concerned with which of the
following vulnerabilities?

A.
The potential for unauthorized deletion of report copies

B.
The potential for unauthorized modification of report copies

C.
The potential for unauthorized printing of report copies

D.
The potential for unauthorized editing of report copies

Explanation:
When reviewing print systems spooling, an IS auditor is most concerned with the potential for
unauthorized printing of report copies.

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *