Isaca CISM Practice Test 18

Question 1 / 40
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?