Notifications
Clear all
Topic starter
27/10/2022 1:09 pm
An IT department has given a vendor remote access to the internal network for troubleshooting network performance problems.
After discovering the remote activity during a firewall log review, which of the following is the FIRST course of action for an information security manager?
- A . Determine the level of access granted
- B . Review the related service level agreement (SLA).
- C . Revoke the access.
- D . Declare a security incident.
Suggested Answer: A