CISA Certified Information Systems Auditor – Question1101

Which of the following is a detective control?

A.
Procedures for authorizing transactions
B. Echo checks in telecommunications
C. A router rule restricting a service
D. Programmed edit checks

Correct Answer: B