While reviewing sensitive electronic work papers, the IS auditor noticed that they were not encrypted. This could compromise the: 
A、audit trail of the versioning of the work papers. 
B、approval of the audit phases. 
C、access rights to the work papers. 
D、confidentiality of the work papers. 
							
