To obtain evidence that controls over access to computer programs are properly functioning,audit teams most likely would
A) Create checkpoints at periodic intervals after data processing to test for unauthorized use of the system.
B) Examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction.
C) Enter invalid identification numbers or passwords to ascertain whether the system rejects them.
D) Vouch a random sample of processed transactions to ensure proper authorization.
Correct Answer:
Verified
Q5: Which of the following methods allow fictitious
Q8: Which of the following is not an
Q9: Which of the following organizational positions would
Q17: The basic concept of test data is
Q18: In auditing around the computer,audit teams reconcile
Q19: Computer operators should have complete access to
Q20: A program description should contain a program
Q23: Each of the following automated application controls
Q24: An audit team's approach to evaluating computerized
Q25: The reprocessing of actual data using programs
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents