Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
During a database management review an IT auditor identifies out-of-range data in certain tables of a database. What recommendation should the IT auditor provide to address this finding?
Implement integrity constraints in the database.
Perform tracing and tagging.
Log all table update transactions.
Enable before and after image reporting.
Implementing integrity constraints in the database is a preventive control because data are checked against predefined tables or rules, which prevents any undefined data from being entered. Logging all table update transactions provides audit trails and is a detective control. Before and after image reporting makes it possible to trace the impact that transactions have on computer records and is a detective control. Tracing and tagging is used to test application systems and controls, but is not a preventive control that can avoid out-of-range data.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.