To obtain evidence that controls over access to computer programs are properly functioning,audit teams most likely would
A) Create checkpoints at periodic intervals after data processing to test for unauthorized use of the system.
B) Examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction.
C) Enter invalid identification numbers or passwords to ascertain whether the system rejects them.
D) Vouch a random sample of processed transactions to assure proper authorization.
Correct Answer:
Verified
Q1: In end-user computing environments,the processing control procedures
Q2: The effectiveness of general controls is an
Q4: Which of the following is an example
Q5: Which of the following is a general
Q6: Which of the following controls most likely
Q7: Computer operations controls are typically implemented for
Q8: Which of the following is not an
Q9: Which of the following organizational positions would
Q10: Audit teams would least likely use computer-assisted
Q11: When a real-time computerized processing system is
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents