Coursera Answers

4.3.9 Check Your Understanding – Identify Device Management Activities

4.3.9 Check Your Understanding - Identify Device Management Activities


Cyber Threat Management

Endpoint Vulnerability Assessment

in this article i am gone to share Cyber Threat Management | Endpoint Vulnerability Assessment | 4.3.9 Check Your Understanding – Identify Device Management Activities Quiz Answer with you..


4.3.9 Check Your Understanding – Identify Device Management Activities


Question 1)

Which management activity is the most effective way to mitigate software vulnerabilities and is required by some security compliance regulations?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management



Question 2)

Which device management activity addresses the inventory and control of hardware and software configurations?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management



Question 3)

Which device management activity involves the implementation of systems that track the location and configuration of networked devices and software across an enterprise?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management



Question 4)

Which device management activity is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management



Question 5)

Which device management activity has measures that can disable a lost device, encrypt the data on the device, and enhance device access with more robust authentication measures?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management