A is corrent because reviewing the systems-access log might reveal (detect) unauthorized access to the system. All of the other measures, A through C, serve to prevent errors or fraud. B is incorrect because performing validity checks serves to prevent errors or fraud. C is incorrect because encryption serves to prevent unauthorized access to data. D is incorrect because conducting fraud-awareness training serves to prevent fraud.
|