Which of the following user profiles should be of MOST concern to an IS auditor when performing an audit of an EFT system?
A、Three users with the ability to capture and verify their own messages
B、Five users with the ability to capture and send their own messages
C、Five users with the ability to verify other users and to send their own messages
D、Three users with the ability to capture and verify the messages of other users and to send their own messages
10年專(zhuān)注信管,信管教育專(zhuān)注者,信管網(wǎng)優(yōu)勢(shì)
免費(fèi)試聽(tīng)信管網(wǎng)信息系統(tǒng)項(xiàng)目管理師課程
全國(guó)前50名高分學(xué)員訪談:董麗(174)、李思...
信息系統(tǒng)項(xiàng)目管理師高端班培訓(xùn)課程
信管老師100小時(shí)直播課程
軟考報(bào)名專(zhuān)題(報(bào)名時(shí)間、入口等)
中級(jí)系統(tǒng)集成項(xiàng)目管理工程師通關(guān)課程
系統(tǒng)規(guī)劃與管理師課程(考試介紹與題型分析)
軟題庫(kù):軟考在線題庫(kù)、支持手機(jī)答題