Register now or log in to join your professional community.
(A) They are most useful in complex online systems in which audit trails have either become diminished or are very limited
(B) They are standard components of generic software packages
(C) They allow monitoring a system on a continuous basis for fraudulent transactions
(D) They allow faster detection of unauthorized transactions
(B). They are not standard components of generic software packages, they are usually designed by an auditor based on the application.
(B) They are standard components of generic software packages
They allow faster detection of unauthorized transactions