To determine which users can gain access to the privileged supervisory state, which of the following should an IS auditor review?
A. System access log files
B. Enabled access control software parameters
C. Logs of access control violations
D. System configuration files for control options used
A. System access log files
B. Enabled access control software parameters
C. Logs of access control violations
D. System configuration files for control options used