List of questions
Related questions
Question 512 - CISSP discussion
When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?
A.
Log all activities associated with sensitive systems
B.
Provide links to security policies
C.
Confirm that confidentially agreements are signed
D.
Employ strong access controls
Your answer:
0 comments
Sorted by
Leave a comment first