CISA Certified Information Systems Auditor – Question1432

Security administration procedures require read-only access to:

A.
access control tables.
B. security log files.
C. logging options.
D. user profiles.

Correct Answer: B

Explanation:

Explanation:
Security administration procedures require read-only access to security log files to ensure that, once generated, the logs are not modified. Logs provide evidence and track suspicious transactions and activities. Security administration procedures require write access to access control tables to manage and update the privileges according to authorized business requirements. Logging options require write access to allow the administrator to update the way the transactions and user activities are monitored, captured, stored, processed and reported.