Which of the following online auditing techniques is most effective for the early detection of errors or irregularities?
When performing a computer forensic investigation, in regard to the evidence gathered, an IS auditor should be MOST concerned with: