Watch this video on YouTube
You are an information system auditor at HDA Inc. You are reviewing the access control procedure of a critical application. Which of the following is the best way to determine whether application developers can access the production environment?