When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?
A . Log all activities associated with sensitive systems
B . Provide links to security policies
C . Confirm that confidentially agreements are signed
D . Employ strong access controls
Answer: D
Latest CISSP Dumps Valid Version with 981 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund