I'm not sure, but I think option C could also be important. Reviewing the list of people who attempted to access the workstation and failed might provide valuable insights.
I agree with Sabine. Reviewing the password length, frequency of change, and list of users for the workstation's login process seems like a thorough approach.
The correct answer is B. Reviewing the password length, frequency of change, and list of users for the workstation's login process is the most appropriate set of tests for auditing logical access controls.
Amie
2 months agoIrving
2 months agoLeonor
2 months agoOna
20 days agoOlive
23 days agoLisha
1 months agoVashti
1 months agoJillian
2 months agoAlbina
2 months agoLeota
3 months agoHubert
1 months agoNickolas
2 months agoSabra
2 months agoSabine
3 months ago