Which of the following IT controls is MOST useful in mitigating the risk associated with inaccurate data?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
Of the given IT controls, the MOST useful in mitigating the risk associated with inaccurate data is D. Check totals on data records and data fields.
Check totals on data records and data fields refer to the mathematical calculations performed on data to ensure that the data is accurate and complete. The calculations can include a total of all numeric data in a record, the sum of all values in a data field, or a count of records in a database. By comparing the calculated totals with the expected totals, discrepancies can be identified, which can be indicative of data errors or inaccuracies.
Here are some reasons why this control is effective in mitigating the risk associated with inaccurate data:
Early detection: Check totals can identify data inaccuracies early, allowing for prompt corrective action. This control is especially useful in large databases with many records, where manual checking would be time-consuming and error-prone.
Comprehensive: Check totals provide a comprehensive method for detecting data inaccuracies. Unlike some other controls that only look at specific fields or records, check totals cover all fields and records in a database.
Preventative: Check totals can prevent inaccurate data from being entered into a database in the first place. For example, a system may be configured to reject data entries that do not meet certain criteria, such as total calculations that do not match expected values.
While the other controls (A, B, and C) are also important in ensuring data accuracy, they are not as effective as check totals in mitigating the risk associated with inaccurate data. Here's a brief explanation of why:
A. Audit trails for updates and deletions: Audit trails can provide information about who made changes to data and when, but they do not necessarily identify inaccuracies in the data itself.
B. Encrypted storage of data: Encryption can help protect data from unauthorized access, but it does not address the accuracy of the data.
C. Links to source data: Links to source data can help verify the accuracy of data, but they do not necessarily prevent inaccuracies from being entered into a database.