Audit teams can obtain evidence of the proper functioning of password access control to a computerized processing system by
A. Writing a computer program that simulates the logic of a good password control system.
B. Selecting a random sample of the client’s completed transactions to check the existence of proper authorization.
C. Attempting to sign on to the computerized processing system with a false password.
D. Obtaining representations from the client’s computer personnel that the password control prevents unauthorized entry.
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.