I'm not sure, but I think option C could also be important. Reviewing the list of people who attempted to access the workstation and failed might provide valuable insights.
I agree with Sabine. Reviewing the password length, frequency of change, and list of users for the workstation's login process seems like a thorough approach.
The correct answer is B. Reviewing the password length, frequency of change, and list of users for the workstation's login process is the most appropriate set of tests for auditing logical access controls.
Amie
19 days agoIrving
20 days agoLeonor
22 days agoLisha
9 days agoVashti
11 days agoJillian
1 months agoAlbina
1 months agoLeota
2 months agoHubert
15 days agoNickolas
20 days agoSabra
26 days agoSabine
2 months ago