Which of the following scenarios best describes the violation of legally mandated procedures for controlling the information technology (IT) assets?
A) IT system controls are inadequate to meet specific federal Sarbanes-Oxley guidelines that require companies to maintain the integrity of financial data.
B) IT system controls are violated so that the same person can both initiate a purchase order and approve the invoice for that purchase order.
C) Employees waste time at work visiting Web sites unrelated to their work.
D) Hackers access and download customer data,including account numbers,and carry out a denial-of-service attack on an organization's Web site.
Correct Answer:
Verified
Q69: Increased costs and wasted effort are consequences
Q70: Hackers carry out a denial-of-service attack on
Q71: Companies capture significant benefits by just implementing
Q72: When a new information technology is introduced,managers
Q73: Introducing an enterprise information technology system represents
Q74: The goal of commit phase in the
Q75: Which of the following scenarios best describes
Q76: Employees of Jackshay Corp.misuse their time by
Q78: Laggards are risk takers who attempts to
Q79: Product life cycle management supports only the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents