Which of the following controls will BEST detect unauthorized modification of data by a database administrator?
A. Reviewing database access rights
B. Reviewing changes to edit checks
C. Comparing data to input records
D. Reviewing database activity logs
A. Reviewing database access rights
B. Reviewing changes to edit checks
C. Comparing data to input records
D. Reviewing database activity logs