Automated mechanisms exist to prevent the execution of unauthorized software programs.
Does the organization use automated mechanisms to prevent the execution of unauthorized software programs?