To detect unauthorized direct changes to master files,the auditor traces these changes back to the underlying
A) transaction files.
B) source documents.
C) hypothetical transactions.
D) control account balances.
Correct Answer:
Verified
Q128: Guidelines and standards that are important to
Q129: The _ makes it a federal felony
Q130: The three objectives of information security include
A)
Q131: The information security management system life cycle
Q132: A flying-start site
A) is the most commonly
Q134: Which of the following is an ideal
Q135: The most basic security procedure in system-access
Q136: Sandra Johnson is her company's chief security
Q137: A company which specializes in processing the
Q138: The ISO series numbers that define implementation,measuring
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents