When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?

When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?
A . Log all activities associated with sensitive systems
B . Provide links to security policies
C . Confirm that confidentially agreements are signed
D . Employ strong access controls

Answer: D

Latest CISSP Dumps Valid Version with 981 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments