25)Which of the following technique involves embedding audit software modules within a host application system to provide continuous monitoring of the system’s transactions?
(25)Which of the following technique involves embedding audit software
modules within a host application system to provide continuous monitoring of
the system’s transactions?
(a)Audit hooks
(b) SCARF
(c)Integrated Test Facility
(ITF)
(d)Continuous and Intermittent
Simulation (CIS)