Isaca CISA Question Answer
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Isaca CISA Question Answer
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?