Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
A. Change control log
B. System initialization logs
C. Security system parameters
D. Documentation of exit routines
A. Change control log
B. System initialization logs
C. Security system parameters
D. Documentation of exit routines