Security management practices that limit access to technologies is a function included in which COSO component of internal control structure?
A) Control environment.
B) Risk assessment.
C) Control activities.
D) Monitoring.
Correct Answer:
Verified
Q80: Which of the following is an example
Q81: Which of the following best represents a
Q82: Which of the following activities would be
Q83: Which of the following is an example
Q84: Which component of COSO's internal control system
Q86: Which of the following is not a
Q87: Which of the following services does the
Q88: Which of the following groups is interested
Q89: Which COSO component of internal control concerns
Q90: Which of the following is not part
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents