(b) The requirement is to identify the risk that increases
when an EFT system is used. Answer (b) is correct because
unauthorized access is a risk which is higher in an EFT environment.
Answers (a), (c), and (d) are all incorrect because this is a
risk which is common to each IT environment.