True/False
If no source documents are used by the IT system, then the general controls, such as computer logging of transactions, become less important.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q5: This type of control is intended to
Q7: The use of passwords to allow only
Q11: An organization must maintain procedures to protect
Q13: Which programmed input validation check compares the
Q13: The work arrangement where employees work from
Q15: Employees who hack into computer networks are
Q65: A small piece of program code that
Q69: This method of monitoring exposure can involve
Q81: Unchecked risks and threats to the IT
Q82: Availability risks, related to the authentication of