Question: Which two controls should work the best for the threat of Unauthorized disclosure of sensitive information in the Expenditure Cycle? Data processing integrity controls &
Which two controls should work the best for the threat of "Unauthorized disclosure of sensitive information" in the Expenditure Cycle?
Data processing integrity controls & Backups
Access controls & Well designed managerial reports
Review of all changes to master data & Encryption
Access controls & Encryption
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
