This is a dedicated watch page for a single video.
You are auditing HDA Inc. as an information system auditor, and during your audit, you come across an option in a database that grants the administrator the ability to directly modify any table. This option is intended to address software bugs but is rarely utilized, and changes made to tables are automatically logged. What should be your initial action as an IS auditor in this situation?