List of questions
Related questions
Question 437 - CISM discussion
Application data integrity risk is MOST directly addressed by a design that includes:
A.
reconciliation routines such as checksums, hash totals, and record counts.
B.
strict application of an authorized data dictionary.
C.
application log requirements such as field-level audit trails and user activity logs.
D.
access control technologies such as role-based entitlements.
Your answer:
0 comments
Sorted by
Leave a comment first