Isaca CISM Question Answer
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?
Isaca CISM Question Answer
When remote access to confidential information is granted to a vendor for analytic purposes, which of the following is the MOST important security consideration?