When performing an audit of access rights, an IS auditor should be suspicious of which of the following if allocated to a computer operator? 
A、Read access to data 
B、Delete access to transaction data files 
C、Logged read/execute access to programs 
D、Update access to job control language/script files 
							
