Who is ultimately responsible and accountable for reviewing user access to systems?
A. Systems security administrators
B. Data custodians
C. Data owners
D. Information systems auditors
A. Systems security administrators
B. Data custodians
C. Data owners
D. Information systems auditors