Certified Information Systems Auditor (CISA) Question:
Which of the following is the MOST effective control when granting temporary access to vendors?

Answer:
1. Vendor access corresponds to the service level agreement (SLA).
2. User accounts are created with expiration dates and are based on services provided.
3. Administrator access is provided for a limited period.
4. User IDs are deleted when the work is completed.
Answer: B
2. User accounts are created with expiration dates and are based on services provided.
3. Administrator access is provided for a limited period.
4. User IDs are deleted when the work is completed.
Answer: B
Previous Question | Next Question |
Which of the following acts as a decoy to detect active Internet attacks? | A certifying authority (CA) can delegate the processes of: |