When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
A) Vendors uses their own laptop and logins with same admin credentials your security team uses
B) Vendor uses a company supplied laptop and logins using two factor authentication with same admin credentials your security team uses
C) Vendor uses a company supplied laptop and logins using two factor authentication with their own unique credentials
D) Vendor uses their own laptop and logins using two factor authentication with their own unique credentials
Correct Answer:
Verified
Q97: An application vulnerability assessment has identified a
Q98: You currently cannot provide for 24/7 coverage
Q99: Which of the following is the MOST
Q100: Your company has a "no right to
Q101: Which of the following will be MOST
Q103: An example of professional unethical behavior is:
A)
Q104: What oversight should the information security team
Q105: The Security Operations Center (SOC) just purchased
Q106: Which of the following is considered one
Q107: When entering into a third party vendor
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents