Question: To obtain evidence that controls over access to computer programs are properly functioning, audit teams most likely would A . create checkpoints at periodic intervals
To obtain evidence that controls over access to computer programs are properly functioning, audit teams most likely would
A
create checkpoints at periodic intervals after data processing to test for unauthorized use of the system
B
examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction
C
enter invalid identification numbers or passwords to ascertain whether the system rejects them
D
vouch a random sample of processed transactions to assure proper authorization
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
