ابدأ بالتواصل مع الأشخاص وتبادل معارفك المهنية

أنشئ حسابًا أو سجّل الدخول للانضمام إلى مجتمعك المهني.

متابعة

Programme controls entail: a. Manual logs; training of staff; b. firewall; insurance, maintenance; c. User authorisation; data encryption

user-image
تم إضافة السؤال من قبل مستخدم محذوف‎
تاريخ النشر: 2015/01/20
imran Noor -
من قبل imran Noor - , Audit Officer , Auditor General of Pakistan

The correct option is (C)

Waqayan Al Waqayan
من قبل Waqayan Al Waqayan , Secretary of Sharia Supervisory Board (SSB) , Ahli United Bank (AUB)

all of them are good controls. however c. is the most relevant and important application control.

Waqas Raza Khan
من قبل Waqas Raza Khan , Accountant , Cold Store Group of Saudi Arabia

Option C

احمد صبحي احمد الصباغ الصباغ
من قبل احمد صبحي احمد الصباغ الصباغ , محاسب عام في قسم الميزانية , شركة الجبر لتجارة السيارات -كيا موتورز

Because data encryption Si easily breached if the encryption software of the type complex either protection system through the entry permit is useful somewhat, but a breakthrough is faster than the encryption system by special methods used by the hacker easy access easily to the site without passing the permit system them to enter or not remains regularity best for the safety and privacy of encryption programs

Khurram Shaukat Memon
من قبل Khurram Shaukat Memon , Academic Research Writer , Freelance Academic Research Writer

I think option (c) is correct answer.

Mir Mujtaba Ali
من قبل Mir Mujtaba Ali , Internal Audit Manager , Confidential

Option C could be the answer - I guess

?

المزيد من الأسئلة المماثلة