CISA Certified Information Systems Auditor – Question2394

What can be used to help identify and investigate unauthorized transactions?

A.
Postmortem review
B. Reasonableness checks
C. Data-mining techniques
D. Expert systems

Correct Answer: C

Explanation:

Explanation:
Data-mining techniques can be used to help identify and investigate unauthorized transactions.