Question 413:
Application data integrity risk would be MOST directly addressed by a design that includes:
Answer options:
A. access control technologies such as role-based entitlements. B. strict application of an authorized data dictionary. C. application log requirements such as field-level audit trails and user activity logs. D. reconciliation routines such as checksums, hash totals, and record counts.