CISA Certified Information Systems Auditor – Question1223

During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?

A.
Identification
B. Data integrity
C. Data validation
D. Authentication

Correct Answer: D