Each of the following represents a risk of relying on computerized information systems except:
A) unauthorized access.
B) inappropriate manual intervention.
C) reduction in circumvention of controls.
D) potential loss of data.
Correct Answer:
Verified
Q52: Social engineering is the term used to
Q53: Which of the following is an example
Q54: Which of the following is an example
Q55: Which of the following statements regarding Enterprise
Q56: Following are procedures used by auditors to
Q58: Segregation of duties within the IT world
Q59: Contingency controls are primarily concerned with:
A) batch
Q60: Backup controls for data files and hardware
Q61: In smaller companies where management's interaction with
Q62: According to the PCAOB Guidance for Auditors
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents