An IT Auditor discovers that the configuration settings for password controls are more stringent for business users than for network administrators. Which of the following is the best action for the IT Auditor to take?
Document that this is a policy violation
Recommend that all configuration settings be identical
Recommend that logs of all user access be monitored periodically
Recommend that network administrator settings be more stringent given their risk