D It performs a software scan on computers to collect software data information

D it performs a software scan on computers to collect

This preview shows page 5 - 7 out of 7 pages.

D. It performs a software scan on computers to collect software data information. Answer: B QUESTION: 97 What are two benefits of hardware device control? (Select two.) A. optimizes performance of removable hard drives B. prevents propagation of malicious code C. tracks devices if they are lost or stolen D. reduces the risk of confidential data loss E. eliminates the need for asset management Answer: B, D QUESTION: 98 Which endpoint protection strategy uses rulesets to block or allow network traffic going to or coming from the endpoint? A. host intrusion prevention B. application control C. network device control D. host-based firewall Answer: D 30
Image of page 5
QUESTION: 99 What ensures conformity and adherence to an accepted standard? A. policy B. regulation C. framework D. compliance Answer: D QUESTION: 100 What are two parts of the security configuration management process? (Select two.) A. assess B. archive C. correlate D. measure E. remediate Answer: A, E 31
Image of page 6
For More exams visit http s ://killexams.com /vendors-exam-list Kill your exam at First Attempt .... Guaranteed!
Image of page 7

You've reached the end of your free preview.

Want to read all 7 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture