Users can install software in organizational systems if provided the necessary privileges. To maintain control over the software installed, organizations identify permitted and prohibited actions regarding software installation through policies. Permitted software installations include updates and security patches to existing software and applications from organization-approved “app stores.” Prohibited software installations may include software with unknown or suspect pedigrees or software that organizations consider potentially malicious. The policies organizations select governing user-installed software may be organization-developed or provided by some external entity. Policy enforcement methods include procedural methods, automated methods, or both.
0 of 1 Questions completed
You have already completed the checklist before. Hence you can not start it again.
Checklist is loading…
You must sign in or sign up to start the checklist.
You must first complete the following:
0 of 1 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
1. Question3 point(s)
3.4.9 Assessment Objectives / Determination Statements by Requirements Checklist
(confirm all that apply)