D. It performs a software scan on computers to collect software data information. Answer: B QUESTION: 97 What are two benefits of hardware device control? (Select two.) A. optimizes performance of removable hard drives B. prevents propagation of malicious code C. tracks devices if they are lost or stolen D. reduces the risk of confidential data loss E. eliminates the need for asset management Answer: B, D QUESTION: 98 Which endpoint protection strategy uses rulesets to block or allow network traffic going to or coming from the endpoint? A. host intrusion prevention B. application control C. network device control D. host-based firewall Answer: D 30
QUESTION: 99 What ensures conformity and adherence to an accepted standard? A. policy B. regulation C. framework D. compliance Answer: D QUESTION: 100 What are two parts of the security configuration management process? (Select two.) A. assess B. archive C. correlate D. measure E. remediate Answer: A, E 31
For More exams visit http s ://killexams.com /vendors-exam-list Kill your exam at First Attempt .... Guaranteed!
You've reached the end of your free preview.
Want to read all 7 pages?
- Fall '19
- Computer Security, Symantec