Question: To obtain evidence that controls over access to computer programs are properly functioning, audit teams most likely would A . create checkpoints at periodic intervals

To obtain evidence that controls over access to computer programs are properly functioning, audit teams most likely would
A.
create checkpoints at periodic intervals after data processing to test for unauthorized use of the system
B.
examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction
C.
enter invalid identification numbers or passwords to ascertain whether the system rejects them
D.
vouch a random sample of processed transactions to assure proper authorization

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!