AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: A third-party application used by your isaca video

Question 1
« Back   Next cism Certification Question »

Full Certification Question

A third-party application used by your organization recently suffered a zero-day exploit. As the Information Security Manager, which method would be MOST effective in addressing this threat?