Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
After hearing rumors about being fired, a programmer maliciously changes data in an application and then restores the orignal code after finding out the rumor was not true. What is the best detective control that would capture the programmer's actions?
Reviewing system log files
Reviewing executable and source code integrity
Comparing source code in the application's test environment
Comparing object code from a recent backup
Reviewing system log files is the only trail that may provide information about the unauthorized activities in the production library. Source and object code comparisons are ineffective, because the original programs were restored and do not exist. Reviewing executable and source code integrity is an ineffective control, because integrity between the executable and source code is automatically maintained.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.