After discovering t...
 
Notifications
Clear all

After discovering the remote activity during a firewall log review, which of the following is the FIRST course of action for an information security manager?

1 Posts
1 Users
0 Likes
82 Views
(@hevesywilber)
Noble Member
Joined: 2 years ago
Posts: 682
Topic starter  

An IT department has given a vendor remote access to the internal network for troubleshooting network performance problems.

After discovering the remote activity during a firewall log review, which of the following is the FIRST course of action for an information security manager?

  • A . Determine the level of access granted
  • B . Review the related service level agreement (SLA).
  • C . Revoke the access.
  • D . Declare a security incident.

Show Answer Hide Answer

Suggested Answer: A

   
Quote

Latest ISACA CISM Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: