CISM Certified Information Security Manager – Question0667

Which of the following practices is BEST to remove system access for contractors and other temporary users when it is no longer required?

A.
Log all account usage and send it to their manager
B. Establish predetermined automatic expiration dates
C. Require managers to e-mail security when the user leaves
D. Ensure each individual has signed a security acknowledgement

Correct Answer: B

Explanation:

Explanation:
Predetermined expiration dates are the most effective means of removing systems access for temporary users. Reliance on managers to promptly send in termination notices cannot always be counted on, while requiring each individual to sign a security acknowledgement would have little effect in this case.