CISM Certified Information Security Manager – Question1218

When granting a vendor remote access to a system, which of the following is the MOST important consideration?

A.
Session monitoring
B. Hard drive encryption
C. Multi-factor authentication
D. Password hashing

Correct Answer: A