An IS auditor discovers instances where software with the same license key is deployed to multiple workstations, in breach of the licensing agreement. Which of the following is the auditor’s BEST recommendation?
A. Evaluate the business case for funding of additional licenses.
B. Require business owner approval before granting software access.
C. Remove embedded keys from offending packages.
D. Implement software licensing monitoring to manage duplications.
A. Evaluate the business case for funding of additional licenses.
B. Require business owner approval before granting software access.
C. Remove embedded keys from offending packages.
D. Implement software licensing monitoring to manage duplications.