An IS auditor examining the configuration of an operating system to verify the controls should review the: A、transaction logs. B、authorization tables. C、parameter settings. D、routing tables.