Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The IT Specialist has concluded that users have unauthorized access to the system, but not the system logs. The IT Specialist has performed mitigating procedures

The IT Specialist has concluded that users have unauthorized access to the system, but not the system logs. The IT Specialist has performed mitigating procedures to obtain sufficient persuasive evidence that those specific users did not actually log onto the system during the period of unauthorized access, therefore the potential exposure of the deficiency is mitigated. In this scenario, we may conclude that a. we need to modify our audit plan b. it will not be appropriate to rely on the system logs fort the mitigating procedures c. the IT risk related to the GITC deficiency is addressed for the financial statement audit d. the IT risk related to the GITC deficiency is unaddressed for the financial statement audit

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intermediate Accounting

Authors: James D. Stice, Earl K. Stice, Fred Skousen

17th Edition

032459237X, 978-0324592375

More Books

Students also viewed these Accounting questions

Question

LO 20-1 Explain what money is and what makes money useful.

Answered: 1 week ago