Which of the following is the MOST effective control when granting temporary access to vendors?
Submitted by: Administrator1. Vendor access corresponds to the service level agreement (SLA).
2. User accounts are created with expiration dates and are based on services provided.
3. Administrator access is provided for a limited period.
4. User IDs are deleted when the work is completed.
Answer: B
Submitted by: Administrator
2. User accounts are created with expiration dates and are based on services provided.
3. Administrator access is provided for a limited period.
4. User IDs are deleted when the work is completed.
Answer: B
Submitted by: Administrator
Read Online CISA Job Interview Questions And Answers
Top CISA Questions
☺ | An IS auditor is performing an audit of a network operating system. Which of the following is a user feature the IS auditor should review? |
☺ | Which of the following is the MOST effective control when granting temporary access to vendors? |
☺ | While designing the business continuity plan (BCP) for an airline reservation system, the MOST appropriate method of data transfer/backup at an offsite location would be: |
☺ | Which of the following cryptography options would increase overhead/cost? |
☺ | IT control objectives are useful to IS auditors, as they provide the basis for understanding the: |
Top IT (Information Technology) Categories
☺ | Computer Operator Interview Questions. |
☺ | Telecommunications Interview Questions. |
☺ | Information Technology Interview Questions. |
☺ | Data Entry Interview Questions. |
☺ | IT Support Interview Questions. |