Mechanisms exist to configure systems to prevent the execution of unauthorized software programs.
Does the organization configure systems to prevent the execution of unauthorized software programs?