cisco

4.3.9 Check Your Understanding

Hello Friends in this article i am gone to share Cyber Threat Management | Endpoint Vulnerability Assessment | 4.3.9 Check Your Understanding – Identify Device Management Activities Quiz Answer with you..

Endpoint Vulnerability Assessment


Also visit this link:  4.3.2 Check Your Understanding Identify the Risk Response Quiz


 

4.3.9 Check Your Understanding – Identify Device Management Activities

Question 1) Which management activity is the most effective way to mitigate software vulnerabilities and is required by some security compliance regulations?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management

Question 2) Which device management activity addresses the inventory and control of hardware and software configurations?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management

Question 3) Which device management activity involves the implementation of systems that track the location and configuration of networked devices and software across an enterprise?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management

Question 4) Which device management activity is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management

Question 5) Which device management activity has measures that can disable a lost device, encrypt the data on the device, and enhance device access with more robust authentication measures?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management