When reviewing print systems spooling, an IS auditor is MOST concerned with which of the following
vulnerabilities?

A.
The potential for unauthorized deletion of report copies
B.
The potential for unauthorized modification of report copies
C.
The potential for unauthorized printing of report copies
D.
The potential for unauthorized editing of report copies
Explanation:
When reviewing print systems spooling, an IS auditor is most concerned with the potential for unauthorized
printing of report copies.