What can be used to help identify and investigate unauthorized transactions?
A. Postmortem review
B. Reasonableness checks
C. Data-mining techniques
D. Expert systems
A. Postmortem review
B. Reasonableness checks
C. Data-mining techniques
D. Expert systems