To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should recommend:
A.
online terminals are placed in restricted areas.
B.
online terminals are equipped with key locks.
C.
ID cards are required to gain access to online terminals.
D.
online access is terminated after a specified number of unsuccessful attempts.
Explanation:
The most appropriate control to prevent unauthorized entry is to terminate connection after a specified number of attempts. This will deter access through the guessing of IDs and passwords. The other choices are physical controls, which are not effective in deterring unauthorized accesses via telephone lines.