正解:D
Comprehensive and Detailed Step-by-Step Explanation:
Ensuring data integrity iscritical, even when handling publicly available information.
* Option A (Incorrect):While tracking system interfaces is useful formonitoring, it is not thegreatest concernif the data being transferred is publicly available.
* Option B (Incorrect):Encryption isimportant, but if the data is alreadypublic, therisk impact is lowercompared to data integrity issues.
* Option C (Incorrect):Data interception may not be a critical issue forpublicdata unless it leads to modification or exploitation.
* Option D (Correct):If thedata from the originating system differsfrom the downloaded data, it indicates adata integrity failure. This could result from system errors, transmission faults, or tampering, making it thehighest riskfor an IS auditor to address.
Reference:ISACA CISA Review Manual -Domain 4: Information Systems Operations and Business Resilience- Covers system interfaces, data integrity, and auditing techniques.