Certified Information Systems Auditor (CISA) Question:

Which of the following is the MOST effective control when granting temporary access to vendors?

CISA Interview Question
CISA Interview Question

Answer:

1. Vendor access corresponds to the service level agreement (SLA).
2. User accounts are created with expiration dates and are based on services provided.
3. Administrator access is provided for a limited period.
4. User IDs are deleted when the work is completed.

Answer: B


Previous QuestionNext Question
Which of the following acts as a decoy to detect active Internet attacks?A certifying authority (CA) can delegate the processes of: