ExamGecko
Question list
Search
Search

Related questions

Question 411 - CISA discussion

Report
Export

Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?

A.
Have an independent party review the source calculations
Answers
A.
Have an independent party review the source calculations
B.
Execute copies of EUC programs out of a secure library
Answers
B.
Execute copies of EUC programs out of a secure library
C.
implement complex password controls
Answers
C.
implement complex password controls
D.
Verify EUC results through manual calculations
Answers
D.
Verify EUC results through manual calculations
Suggested answer: B

Explanation:

The best way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC) is to execute copies of EUC programs out of a secure library. This will ensure that the original EUC programs are protected from unauthorized changes and that the copies are run in a controlled environment. A secure library is a repository of EUC programs that have been tested, validated, and approved by the appropriate authority. Executing copies of EUC programs out of a secure library can also help with version control, backup, and recovery of EUC programs. Having an independent party review the source calculations, implementing complex password controls, and verifying EUC results through manual calculations are not as effective as executing copies of EUC programs out of a secure library, as they do not prevent or detect unintentional modifications of complex calculations in EUC.Reference:End-User Computing (EUC) Risks: A Comprehensive Guide,End User Computing (EUC) Risk Management

asked 18/09/2024
walterio mendez
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first