Which of the following user profiles should be of MOST
concern to the IS auditor, when performing an audit of an
EFT system?

A. Three users with the ability to capture and verifiy their
own messages

B. Five users with the ability to capturr and send their own
messages

C. Five users with the ability to verificy other users and
to send of their own messages

D. Three users with the ability to capture and verifiy the
messages of other users and to send their own messages

Answer Posted / guest

Answer: A

The ability by one individual to capture and verify messages
represents an inadequate segregation, since messages can be
taken as correct and as if they had already been verified.

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2838


purchase orders issued to vendors have been authorized as per the authorization matrix

1089