CISM Certified Information Security Manager – Question0443

Application data integrity risk would be MOST directly addressed by a design that includes:

A.
access control technologies such as role-based entitlements.
B. strict application of an authorized data dictionary.
C. application log requirements such as field-level audit trails and user activity logs.
D. reconciliation routines such as checksums, hash totals, and record counts.

Correct Answer: D