List of questions
Related questions
Question 681 - CISM discussion
Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?
A.
Implement compensating controls to address the risk.
B.
Report the risk associated with the policy breach.
C.
Implement a privileged access management system.
D.
Enforce the security configuration and require the change to be reverted.
Your answer:
0 comments
Sorted by
Leave a comment first