23.3.9 Check Your Understanding – Identify Device Management Activities Answers

1. Which management activity is the most effective way to mitigate software vulnerabilities and is required by some security compliance regulations? Asset management Configuration management Enterprise patch management Mobile device management Vulnerability management 2. Which device management activity addresses the inventory and control of hardware and software configurations? …

22.2.5 Check Your Understanding – Identify the Host-Based Intrusion Protection Terminology Answers

1. What allows Linux system administrators to configure network access rules that are part of the Linux kernel Netfilter modules? Policy-based strategy nftables iptables Windows Firewall Windows Defender Firewall 2. Which of the following uses a profile-based approach to configuring firewall functionality? iptables Windows firewall Policy-based strategy TCP …