To obtain evidence that controls over access to computer programs are properly functioning, audit teams most likely would
A. Create checkpoints at periodic intervals after data processing to test for unauthorized use of the system.
B. Examine the transaction log to discover whether any transactions were lost or entered twice due to a system malfunction.
C. Enter invalid identification numbers or passwords to ascertain whether the system rejects them.
D. Vouch a random sample of processed transactions to ensure proper authorization.
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.