A company hired an external consultant to assist with required system upgrades to a critical business application. A systems administrator needs to secure the consultant's access without sharing passwords to critical systems. Which of the following solutions should most likely be utilized?
a4e15bd
Highly Voted 11 months, 1 week agokalmax5400
Most Recent 4 months, 3 weeks agoscoobysnack209
11 months, 1 week ago