Exam CISA All QuestionsBrowse all questions from this exam
Question 284

Of the following, who are the MOST appropriate staff for ensuring the alignment of user authorization tables with approved authorization forms?

    Correct Answer: A

    Security administrators are typically responsible for managing access rights and privileges within an information system. They ensure that the user authorization tables are consistent with the approved authorization forms, which outline the roles and permissions for each user. Security administrators also monitor and audit user activities to enforce security policies and standards.

Discussion
peeluOption: B

System owners

3008Option: A

The answer to this question is A. Security administrators. Security administrators are responsible for managing the access rights and privileges of users in an information system. They ensure that the user authorization tables are consistent with the approved authorization forms, which specify the roles and permissions of each user. Security administrators also monitor and audit the user activities and enforce the security policies and standards. System owners, database administrators (DBAs), and IT managers are not directly involved in the user authorization process, although they may have some roles and responsibilities related to the security of the system. System owners are accountable for the overall performance and functionality of the system, DBAs are in charge of the design and maintenance of the database, and IT managers oversee the IT resources and staff.

ChaBum

when Security administrators or DBAs are responsible to enforce technical means of access control, they are not the one able to decide which users may access what data, this is up the data owners, or the system owners, and this because it is a business decision.

SwallowsOption: B

While security administrators (option A) may play a role in implementing and managing user authorization controls, system owners typically have a more direct stake in the specific systems and are responsible for ensuring that access permissions align with business needs and security policies. Therefore, system owners are the MOST appropriate staff for ensuring the alignment of user authorization tables with approved authorization forms.