When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
A) Vendor uses their own laptop and logins using two factor authentication with their own unique credentials
B) Vendor uses a company supplied laptop and logins using two factor authentication wit same admin credentials your security team uses
C) Vendor uses a company supplied laptop and logins using two factor authentication with their own unique credentials
D) Vendors uses their own laptop and logins with same admin credentials your security team uses
Correct Answer:
Verified
Q119: Which of the following represents the best
Q120: Which of the following is a major
Q121: Which of the following is considered a
Q122: Which of the following is MOST beneficial
Q123: A newly appointed security officer finds data
Q125: A CISO sees abnormally high volumes of
Q126: Knowing the potential financial loss an organization
Q127: File Integrity Monitoring (FIM) is considered a_.
A)
Q128: A stakeholder is a person or group:
A)
Q129: What are the primary reasons for the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents