During an audit of a contract for computer security, a governmental auditor finds that a contractor has developed a system that could be the most advanced in the industry. If it seems that the contractor is charging the government for developmental cost of a system that might be sold to other organizations, what is the auditor's best course of action?
An internal auditor plans to conduct a walk-through to evaluate the control design of a process. Which of the
following techniques is the auditor most likely to use?