To determine who has been given permission to use a particular system resource, an IS auditor should review:
A. activity lists.
B. access control lists.
C. logon ID lists.
D. password lists.
Explanation:
Access control lists are the authorization tables that document the users who have been given permission to use a particular system resource and the types of access they have been granted. The other choices would not document who has been given permission to use (access) specific system resources.