Which of the following is a sound network configuration practice to enhance information security?
A . Change management practices to ensure operating system patch documentation is retained.
B . User role requirements are documented in accordance with appropriate application-level control needs.
C . Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity.
D . Interfaces reinforce segregation of duties between operations administration and database development.
Answer: C
Latest IIA-CIA-Part3 Dumps Valid Version with 402 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund