An IS auditor is tasked with reviewing an organization's purchase invoices to discover fictitious entries that may have been created as part of a suspected fraud scheme. Which of the following is the MOST effective data analysis technique for this situation?
CCNPWILL
3Â months, 2Â weeks ago