Application data integrity risk would be MOST directly addressed by a design that includes:
A. access control technologies such as role-based entitlements.
B. strict application of an authorized data dictionary.
C. application log requirements such as field-level audit trails and user activity logs.
D. reconciliation routines such as checksums, hash totals, and record counts.
A. access control technologies such as role-based entitlements.
B. strict application of an authorized data dictionary.
C. application log requirements such as field-level audit trails and user activity logs.
D. reconciliation routines such as checksums, hash totals, and record counts.