4.3.9 Check Your Understanding
Hello Friends in this article i am gone to share Cyber Threat Management | Endpoint Vulnerability Assessment | 4.3.9 Check Your Understanding – Identify Device Management Activities Quiz Answer with you..
Endpoint Vulnerability Assessment
Also visit this link: 4.3.2 Check Your Understanding Identify the Risk Response Quiz
4.3.9 Check Your Understanding – Identify Device Management Activities
Question 1) Which management activity is the most effective way to mitigate software vulnerabilities and is required by some security compliance regulations?
- Asset management
- Configuration management
- Enterprise patch management
- Mobile device management
- Vulnerability management
Question 2) Which device management activity addresses the inventory and control of hardware and software configurations?
- Asset management
- Configuration management
- Enterprise patch management
- Mobile device management
- Vulnerability management
Question 3) Which device management activity involves the implementation of systems that track the location and configuration of networked devices and software across an enterprise?
- Asset management
- Configuration management
- Enterprise patch management
- Mobile device management
- Vulnerability management
Question 4) Which device management activity is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization?
- Asset management
- Configuration management
- Enterprise patch management
- Mobile device management
- Vulnerability management
Question 5) Which device management activity has measures that can disable a lost device, encrypt the data on the device, and enhance device access with more robust authentication measures?
- Asset management
- Configuration management
- Enterprise patch management
- Mobile device management
- Vulnerability management