Watch this video on YouTube
Which of the following is the BEST method to ensure a terminated employee's access to IT systems is revoked upon departure from the organization?