Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
To determine whether modifications to the operating system parameters were authorized, an IS auditor would most likely review the change control log. This log maintains a record of all changes made, including who approved the changes and when they were made, ensuring that all modifications follow proper authorization procedures.
The IS auditor would most likely review the change control log to determine whether modifications to the operating system parameters were authorized, as this log documents all approved changes and their related authorizations.