Monitoring and restricting vendor activities is a crucial step in ensuring the security of information assets. By closely monitoring the activities of vendors within the data center, organizations can detect and prevent unauthorized access, theft, or misuse of sensitive information. This includes implementing controls such as access controls, surveillance systems, and logging mechanisms.
This section is not available anymore. Please use the main Exam Page.CISA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
NainaNivi
1 month ago5b56aae
6 months, 3 weeks agoTTH1019
1 year, 5 months agoswmasinde
2 years ago