An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy and procedures is a(n) __________ .

Fill in the blank(s) with the appropriate word(s).


audit


Computer Science & Information Technology

You might also like to view...

Excel creates a chart on the same worksheet as the original data, but you can move the chart to its own chart sheet in the workbook

Indicate whether the statement is true or false

Computer Science & Information Technology

Networks can span unlimited areas outside of your home office or school.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Using two keys in combination to perform an action is known as a(n) ________

A) quick method B) quick key C) keyboard cheat D) keyboard shortcut

Computer Science & Information Technology

Traversing a graph is different than traversing a binary tree.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology