When granting a vendor remote access to a system, which of the following is the MOST important consideration?
A. Session monitoring
B. Hard drive encryption
C. Multi-factor authentication
D. Password hashing
A. Session monitoring
B. Hard drive encryption
C. Multi-factor authentication
D. Password hashing