ExamGecko
Question list
Search
Search

Question 437 - CISM discussion

Report
Export

Application data integrity risk is MOST directly addressed by a design that includes:

A.
reconciliation routines such as checksums, hash totals, and record counts.
Answers
A.
reconciliation routines such as checksums, hash totals, and record counts.
B.
strict application of an authorized data dictionary.
Answers
B.
strict application of an authorized data dictionary.
C.
application log requirements such as field-level audit trails and user activity logs.
Answers
C.
application log requirements such as field-level audit trails and user activity logs.
D.
access control technologies such as role-based entitlements.
Answers
D.
access control technologies such as role-based entitlements.
Suggested answer: A

Explanation:

Reconciliation routines are methods to verify the integrity of data by comparing the input and output of a process or a system. They can detect errors, omissions, duplications or unauthorized modifications of data.They are more directly related to data integrity than the other options, which are more concerned with data definition, logging or access control.Reference= CISM Review Manual, 16th Edition, Chapter 3, Section 3.4.21

asked 01/10/2024
Nichal Maharaj
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first