1.
Which action can be performed when using IT asset management (ITAM) when an employee leaves the organization?
2.
Which type of product should a company use to identify installed software to determine licensing compliance?
3.
Why is security configuration management important to business leaders, according to the Security Solutions 1.0 course?
4.
Which endpoint protection strategy uses system-level control of applications, processes, and hardware devices to prevent inappropriate software from running on a system?
5.
Which endpoint protection strategy uses rulesets to block or allow network traffic going to or coming from the endpoint?
6.
What does patch management need to accurately target computers within an environment?
7.
Which action should accompany the automatic relocation of a confidential file on a file share?
8.
Which network protection strategy offers the strongest protection against outside threats?
9.
Which challenge does security information and event management (SIEM) help solve for customers?
10.
Which type of data can be stored in an asset management system?