What would be the MOST effective method for an isaca video
cism video for what would be the MOST effective method for an information security manager to ensure that all access to a critical device, initially delivered
            Question 1
            Be Honest
          
          
        Answer
          Full Certification Question
What would be the MOST effective method for an information security manager to ensure that all access to a critical device, initially delivered with a single user and password meant to be shared among multiple users, is appropriately authorized?