What can be used to help identify and investigate unauthorized transactions?

Posted by: Pdfprep Category: CISA Tags: , ,

What can be used to help identify and investigate unauthorized transactions?
A . Postmortem review
B . Reasonableness checks
C . Data-mining techniques
D . Expert systems

Answer: C

Explanation:

Data-mining techniques can be used to help identify and investigate unauthorized transactions.

Leave a Reply

Your email address will not be published.