When performing an audit of access rights, an IS auditor should be suspicious of which of the following if allocated to a computer operator?
To determine who has been given permission to use a particular system resource, an IS auditor should review:
To determine who has been given permission to use a particular system resource, an IS auditor should review: