Controls over access to IT systems are particularly important because:
A) Weak access controls prevent unauthorized use of systems
B) Access controls allow auditors to employ continuous auditing techniques
C) Access controls make test data more effective
D) Weak access controls can allow users to bypass many other controls
Correct Answer:
Verified
Q57: Three common techniques auditors use to test
Q58: SQL is:
A)An example of an integrated test
Q59: The four approaches to through-the-computer auditing include
Q60: Which of the following services does SOX
Q61: Information technology governance is the process of
Q63: Increased use of big data by organizations
Q64: Risks of using an integrated test facility
Q65: Continuous audit techniques can improve the effectiveness
Q66: All of the following are reasons why
Q67: The IT Assurance Framework's (ITAF)Performance Standards
A)Provide guidance
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents