Problem

To obtain evidence that controls over access to computer programs are properly functioning...

To obtain evidence that controls over access to computer programs are properly functioning, audit teams most likely would

A. Create checkpoints at periodic intervals after data processing to test for unauthorized use of the system.

B. Examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction.

C. Enter invalid identification numbers or passwords to ascertain whether the system rejects them.

D. Vouch a random sample of processed transactions to ensure proper authorization.

Step-by-Step Solution

Request Professional Solution

Request Solution!

We need at least 10 more requests to produce the solution.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the solution will be notified once they are available.
Add your Solution
Textbook Solutions and Answers Search