Which of the following should concern an IS auditor when reviewing security in a client-server environment? 
A、Protecting data using an encryption technique 
B、Preventing unauthorized access using a diskless workstation 
C、The ability of users to access and modify the database directly 
D、Disabling floppy drives on the users' machines 
							
