Multiple Choice
The process of user identification to ensure that only authorized users are accessing the IT system, which occurs through the use of user ID, password, and other unique identifiers, is called:
A) Processing Integrity
B) Virtualization
C) Availability
D) Authentication
Correct Answer:

Verified
Correct Answer:
Verified
Q40: In following proper segregation of duties, those
Q41: This type of highly integrated IT system,
Q42: An example of an independent verification in
Q43: A special journal used to record all
Q44: A chronological listing of shipments that allows
Q46: Circumstances within a company, related to sales
Q47: Availability risks of e-commerce, or e-business, include
Q48: The preparation of packing lists and shipping
Q49: Under a system of sound internal controls,
Q50: Which of the following is NOT an