You are the project manager of the GHT project.
You are accessing data for further analysis.
You have chosen such a data extraction method in which management monitors its own controls.
Which of the following data extraction methods you are using here?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
Direct extraction from the source system involves management monitoring its own controls, instead of auditors/third parties monitoring management's controls.
It is preferable over extraction from the system custodian.
Incorrect Answers: B: Extracting data from the system custodian (IT) after system owner approval, involves auditors or third parties monitoring management's controls.
Here, in this management does not monitors its own control.
C, D: These are not data extraction methods.
The data extraction method described in the question involves management monitoring its own controls. This suggests that the data is being extracted from within the organization rather than from an external source. Additionally, the data extraction method is being used for further analysis, indicating that the data being extracted is relevant to the project.
Based on these factors, we can eliminate options C and D, which are not related to data extraction methods.
Option B involves extracting data from the system custodian (IT) after system owner approval. While this is a valid data extraction method, it does not directly relate to management monitoring its own controls. Therefore, this option is unlikely to be the correct answer.
The most likely answer is option A, which involves extracting data directly from the source systems after system owner approval. This method allows management to monitor their own controls, as they have direct access to the source data. Additionally, this method ensures that the extracted data is accurate and up-to-date, as it is being pulled directly from the source systems.
In conclusion, the data extraction method being used in the GHT project is most likely option A - extracting data directly from the source systems after system owner approval.