Question: To obtain evidence that online access controls are properly functioning, an auditor most likely would a. Create checkpoints at periodic intervals after live data processing
To obtain evidence that online access controls are properly functioning, an auditor most likely would
a. Create checkpoints at periodic intervals after live data processing to test for unauthorized use of the system.
b. Examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction.
c. Enter invalid identification numbers or passwords to ascertain whether the system rejects them.
d. Vouch a random sample of processed transactions to assure proper authorization.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
