ExamGecko
Question list
Search
Search

Related questions

Question 369 - CISA discussion

Report
Export

Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?

A.
Monitor and restrict vendor activities
Answers
A.
Monitor and restrict vendor activities
B.
Issues an access card to the vendor.
Answers
B.
Issues an access card to the vendor.
C.
Conceal data devices and information labels
Answers
C.
Conceal data devices and information labels
D.
Restrict use of portable and wireless devices.
Answers
D.
Restrict use of portable and wireless devices.
Suggested answer: A

Explanation:

The most effective control to protect information assets in a data center from theft by a vendor is to monitor and restrict vendor activities. A vendor may have legitimate access to the data center for maintenance or support purposes, but they may also have malicious intentions or be compromised by an attacker. By monitoring and restricting vendor activities, the organization can ensure that the vendor only performs authorized tasks and does not access or tamper with sensitive data or equipment. Issuing an access card to the vendor, concealing data devices and information labels, and restricting use of portable and wireless devices are also useful controls, but they are not as effective as monitoring and restricting vendor activities in preventing theft by a vendor.Reference:

CISA Review Manual, 27th Edition, page 3381

CISA Review Questions, Answers & Explanations Database - 12 Month Subscription

asked 18/09/2024
Duane Joyce
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first