CRISC Certified in Risk and Information Systems Control – Question394

During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?

A.
Authentication
B. Identification
C. Data validation
D. Data integrity

Correct Answer: A