Isaca CISM Practice Test 18
Question 1 / 40
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
Restart test