25)Which of the following technique involves embedding audit software modules within a host application system to provide continuous monitoring of the system’s transactions?



(25)Which of the following technique involves embedding audit software modules within a host application system to provide continuous monitoring of the system’s transactions?


(a)Audit hooks
(b) SCARF
(c)Integrated Test Facility (ITF)
(d)Continuous and Intermittent Simulation (CIS)