When performing an audit of access rights, an IS auditor should be suspicious of which of the following if allocated to a computer operator?
A、Read access to data
B、Delete access to transaction data files
C、Logged read/execute access to programs
D、Update access to job control language/script files