Which of the following is not an information systems audit test of controls?
◦ Observe computer-site access procedures.
◦ Investigate how unauthorized access attempts are handled.
◦ Review logical access policies and procedures.
◦ Examine the results of disaster recovery plan simulations.