Isaca CISA Question Answer
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
Isaca CISA Question Answer
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?