Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Isaca Certified Information Systems Auditor CISA Question # 132 Topic 14 Discussion

Isaca Certified Information Systems Auditor CISA Question # 132 Topic 14 Discussion

CISA Exam Topic 14 Question 132 Discussion:
Question #: 132
Topic #: 14

Which of the following is the MOST effective method for ensuring the integrity of log data?


A.

Implementing a timestamping mechanism


B.

Implementing cryptographic hash functions


C.

Limiting access to log data


D.

Regularly archiving log data


Get Premium CISA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.