1. Which management activity is the most effective way to mitigate software vulnerabilities and is required by some security compliance regulations?
- Asset management
- Configuration management
- Enterprise patch management
- Mobile device management
- Vulnerability management
2. Which device management activity addresses the inventory and control of hardware and software configurations?
- Asset management
- Configuration management
- Enterprise patch management
- Mobile device management
- Vulnerability management
3. Which device management activity involves the implementation of systems that track the location and configuration of networked devices and software across an enterprise?
- Asset management
- Configuration management
- Enterprise patch management
- Mobile device management
- Vulnerability management
4. Which device management activity is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization?
- Asset management
- Configuration management
- Enterprise patch management
- Mobile device management
- Vulnerability management
5. Which device management activity has measures that can disable a lost device, encrypt the data on the device, and enhance device access with more robust authentication measures?
- Asset management
- Configuration management
- Enterprise patch management
- Mobile device management
- Vulnerability management