Evaluate the two major approaches for testing IT system controls.
Of the two approaches, give your opinion on which you believe provides the most assurance that fraud has not occurred in an
organization.
Evaluate the effectiveness of computer functions that are used to recover deleted files, and identify software packages that are
commonly used to restore deleted files.
If the software fails to recover the deleted files, explain what recommendations you would make to the organization.