Option D directly addresses the detection of unauthorized data changes by having a separate group or individual review the changes independently. This independent review can help identify discrepancies or anomalies that may indicate unauthorized access or alterations to data, providing an effective control for detecting unauthorized changes.
Option C poses a Self-review threat since it is responsibility that is shared, not simply access.
One might be tempted to choose C. But C. is not a control, i.e. logging per se is not yet a control. It only becomes part of a control with the review, but the actual control here is the review. So the correct answer is D. Data changes are independently reviewed by another group.
D. Data changes are independently reviewed by another group.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
dan08
Highly Voted 4 months, 3 weeks ago46080f2
Most Recent 1 month, 1 week agoblues_lee
5 months, 2 weeks agoChaBum
4 months, 1 week agoRachy
5 months, 4 weeks agoChaBum
4 months, 1 week agoChangwha
12 months ago