December 16, 2021 by Admin
An IS auditor notes that a number of application plug-ins currently in use are no longer supported. Which of the following is the auditor’s BEST recommendation to management?
- Implement role-based access controls.
- Conduct a vulnerability assessment to determine exposure.
- Review content backup and archiving procedures.
- Review on-boarding and off-boarding processes.