List of questions
Related questions
Question 482 - CISM discussion
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
A.
Report the risk associated with the policy breach.
B.
Enforce the security configuration and require the change to be reverted.
C.
Implement compensating controls to address the risk.
D.
Implement a privileged access management system.
Your answer:
0 comments
Sorted by
Leave a comment first