An organization has the following written policies: Users must request approval for non-standard software installation. Administrators will perform all software installations. Software must be installed from a trusted repository. A recent security audit identified crypto-currency software installed on one user's machine. There are no indications of compromise on this machine. Which of the following is the MOST likely cause of this policy violation and the BEST remediation to prevent a reoccurrence?
A) The user's machine was infected with malware; implement the organization's incident response
B) The user installed the software on the machine; implement technical controls to enforce the written policies
C) The crypto-currency software was misidentified and is authorized; add the software to the organization's approved list
D) Administrators downloaded the software from an untrusted repository; add a policy that requires integrity checking for all software.
Correct Answer:
Verified
Q598: A security administrator wants to better prepare
Q599: Which of the following is the purpose
Q600: A company occupies the third floor of
Q601: An organization would like to set up
Q602: During certain vulnerability scanning scenarios, it is possible
Q604: An analysis of a threat actor, which
Q605: During a routine check, a security analyst
Q606: Buffer overflow can be avoided using proper:
A)
Q607: A technician wants to implement PKI-based authentication
Q608: Employees receive a benefits enrollment email from
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents