Login activity logs to detect unauthorized access attempts
Correct Answer (B - Reviewing Password Policies and User List for Login Process)
Logical access controls ensure only authorized users can access a workstation.
Reviewing password length, complexity, and change frequency helps assess if security best practices are followed.
Reviewing the list of authorized users ensures that only appropriate personnel have access.
The IIA’s GTAG 9: Identity and Access Management recommends evaluating password policies and user access lists as key control measures.
Why Other Options Are Incorrect:
Option A (Reviewing access badges and room logs):
Physical access controls are important but do not assess logical access (login security, user authentication).
Option C (Reviewing failed access attempts and error messages):
Reviewing failed login attempts identifies security breaches but does not directly assess password policies or user access lists.
Option D (Reviewing unsuccessful passwords and activity logs):
Passwords should not be reviewed due to privacy and security policies. Logs should be checked, but reviewing actual passwords is a security violation.
IIA GTAG 9: Identity and Access Management – Covers password controls and user authentication.
IIA Practice Guide: Auditing IT Security Controls – Recommends reviewing password policies as a key security measure.
Step-by-Step Explanation:IIA References for Validation:Thus, B is the correct answer because reviewing password policies and user lists is essential for auditing logical access controls.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit