Which one of the following are examples of security and controls that would be found in a “trusted”
application system?

A.
Data validation and reliability
B.
Correction routines and reliability
C.
File integrity routines and audit trail
D.
Reconciliation routines and data labels
Explanation:
I have no specific reference for this question but the major resources hammer that there needs to be
methods to check the data for correctness.