Security administration procedures require read-only access to: A、access control tables. B、security log files. C、logging options. D、user profiles.