List of questions
Related questions
Question 575 - CISA discussion
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
A.
Implement real-time activity monitoring for privileged roles
B.
Include the right-to-audit in the vendor contract
C.
Perform a review of privileged roles and responsibilities
D.
Require the vendor to implement job rotation for privileged roles
Your answer:
0 comments
Sorted by
Leave a comment first