True/False
Computer logs should be maintained in order to have a complete record of who used the system and the histories of that use.This computer log would allow monitoring and identification of unauthorized accesses or uses.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q46: Which of the following internal controls wold
Q51: The security and confidentiality risks of computer-based
Q71: When goods are received at the end
Q90: The internal control process of requiring physical
Q92: Which of the following controls is not
Q119: The textbook referred to the three primary
Q124: E-business and EDI have much different advantages
Q126: There are four primary functions of corporate
Q127: The use of a blind purchase order
Q128: Designated members of management should be given