Which of the following types of controls is least often used to protect IT processing equipment?
A. Physical controls
B. Authorizations controls
C. Independent checks or reference
D. Documents and records
Answer: D
Learn More :
Fraud Chapter 17
- Secure Web connections are based on:
- What is the most important factor in control effectiveness?
- Which of the following human features is generally not used in biometrics?
- Passwords and biometrics are both:
- Using a subtly different Internet host name to mimic another business is known as:
- Which of the following fraud risks involves viewing information as it passes along network channels?
- Which of the following fraud risks involves changing IP addresses?
- Which of the following is not an internal control activity or procedure?
- Which of the following is not an element of a company's control environment?
- E-business transactions make it easier to commit which of the following types of frauds?
- Which of the following is not a fraud risk unique to e-business transactions?