54.4k views
0 votes
Methods used to maintain an audit trail in a computerized environment include all of the following except

Question 15 options:

-transaction logs

-transaction listings

-data encryption

-log of automatic transactions

1 Answer

2 votes

Final answer:

In a computerized environment, maintaining an audit trail includes transaction logs, transaction listings, and logs of automatic transactions. Data encryption is not considered a method for maintaining an audit trail as it is a security measure, not a logging mechanism.

Step-by-step explanation:

The question asks about the methods used to maintain an audit trail in a computerized environment. In such an environment, several methods help ensure that financial and transactional information is tracked and recorded systematically. Techniques to maintain an audit trail include transaction logs, which record the details of each transaction processed by the system; transaction listings, which are summaries of transactions processed within a given period; and log of automatic transactions, detailing all actions performed automatically by the system.

However, data encryption is a security measure that safeguards data at rest or in transit but does not inherently provide a record of transactions or system activity for auditing purposes. Therefore, data encryption is not typically considered a method for maintaining an audit trail. It acts more as a safeguard against unauthorized access to data rather than as a logging or tracking mechanism.

User Alejandro Quiroz
by
7.4k points