Creating a computer or paper audit that can help detect wrong doings.
(a) Auditing
(b) Validation
(c) RSN
(d) Verification
I have been asked this question in an interview for internship.
Origin of the question is Encryption and Viruses in section Information Technology of Computer Fundamentals