Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Isaca Certified Information Systems Auditor CISA Question # 351 Topic 36 Discussion

Isaca Certified Information Systems Auditor CISA Question # 351 Topic 36 Discussion

CISA Exam Topic 36 Question 351 Discussion:
Question #: 351
Topic #: 36

A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?


A.

Implement real-time activity monitoring for privileged roles


B.

Include the right-to-audit in the vendor contract


C.

Perform a review of privileged roles and responsibilities


D.

Require the vendor to implement job rotation for privileged roles


Get Premium CISA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.