09121423 - Master IT Training Book

9/11/23

17. ARE CONTROLS ESTABLISHED AND PROCEDURES IMPLEMENTED TO PROTECT ALL SYSTEMS AND TO ENSURE THAT ACCESS TO THE FOLLOWING IS RESTRICTED AND SECURED: SYSTEMS’ SOFTWARE AND APPLICATION PROGRAMS? (INQUIRY AND REVIEW OTHER – AUTHORIZATION LISTS)

27

18. ARE CONTROLS ESTABLISHED AND PROCEDURES IMPLEMENTED TO PROTECT ALL SYSTEMS AND TO ENSURE THAT ACCESS TO THE FOLLOWING IS RESTRICTED AND SECURED: DATA ASSOCIATED WITH CLASS II GAMING? (INQUIRY AND REVIEW OTHER – AUTHORIZATION LISTS)

28

14

Made with FlippingBook - Online catalogs