The security and confidentiality risks of computer-based matching would include:
A) Unauthorized access to the system's ordering and matching functions would allow the insertion of fictitious vendors and / or invoices.
B) Errors in system logic can cause systematic and repetitive errors in matching.
C) The criteria used to identify duplicate payments may be too tightly defined and will overlook duplicate payments.
D) System breakdowns or interruptions can stop or slow the processing of invoices and payments.
Correct Answer:
Verified
Q82: This type of system matching takes place
Q83: There are four primary functions of corporate
Q84: One of the newest technologies related to
Q85: The examination of the system to determine
Q86: Intentionally attempting to circumvent IT system access
Q87: In order to help safeguard the availability
Q88: This type of software alerts the organization
Q89: In order to help safeguard the processing
Q90: Which of the following groups has an
Q91: In order to help safeguard the security
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents