When performing an investigation, which key steps should be taken to maintain and secure supporting documentation used to perform an investigation of a suspicious activity?
A.
Disseminate the rationale for the investigative approach and the objective basis for the determination.
B.
Perform the alerting transaction with alternative thresholds to ensure they are calibrated correctly.
C.
Ensure that a secure archive has information available to the client.
D.
Maintain a record of the transaction activity that generated the alert
Most Votes
Answer:
D
User Votes:
A 13 votes
50%
B 4 votes
50%
C 11 votes
50%
D 54 votes
50%
Discussions
0/ 1000
AnaA.
1 year, 1 month ago
D. Conserver un enregistrement de l'activité de transaction qui a généré l'alerte
Want to join our community?
Please log in or signup in order to use this feature
D. Conserver un enregistrement de l'activité de transaction qui a généré l'alerte