Which of the following is an example of a smart device security control intended to prevent unauthorized users from gaining access to a device's data or applications?
According to IIA guidance on IT auditing, which of the following would not be an area examined by the internal audit activity?