While the absence of audit logging (option A) is indeed a concern for monitoring and tracing activities on the system, the lack of protection for sensitive data poses a more immediate and severe risk. Without adequate protection measures, sensitive information stored within the EUC system could be vulnerable to unauthorized access, modification, or disclosure, leading to data breaches, compliance violations, and reputational damage.
Sensitive information must be protected from unauthorized access, modification, or destruction. If system data is not protected, it may be vulnerable to unauthorized access or modification. Audit logging is important but does not directly relate to the protection of sensitive information.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MunaM
Highly Voted 2 years, 2 months agoPurpleParrot
Most Recent 1 month, 2 weeks agoSwallows
5 months, 1 week agoRS66
4 months, 1 week agohoho
1 year, 5 months agoEBTURK
1 year, 5 months ago