23.3.9 Check Your Understanding – Identify Device Management Activities Answers

1. Which management activity is the most effective way to mitigate software vulnerabilities and is required by some security compliance regulations?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management

Explanation: Enterprise patch management is the most effective way to mitigate software vulnerabilities and is required by some security compliance regulations.

2. Which device management activity addresses the inventory and control of hardware and software configurations?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management

Explanation: Configuration management addresses the inventory and control of hardware and software configurations.

3. Which device management activity involves the implementation of systems that track the location and configuration of networked devices and software across an enterprise?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management

Explanation: Asset management involves the implementation of systems that track the location and configuration of networked devices and software across an enterprise.

4. Which device management activity is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management

Explanation: Vulnerability management is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization.

5. Which device management activity has measures that can disable a lost device, encrypt the data on the device, and enhance device access with more robust authentication measures?

  • Asset management
  • Configuration management
  • Enterprise patch management
  • Mobile device management
  • Vulnerability management

Explanation: Mobile device management has measures that can disable the lost device, encrypt the data on the device, and enhance device access with more robust authentication measures.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x