Isaca CISA Question Answer
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Isaca CISA Question Answer
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?