PdfPrep.com

Which of the following should be measured and analyzed regularly when implementing the Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers CIS Control?

Which of the following should be measured and analyzed regularly when implementing the Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers CIS Control?
A . How long does it take to identify new unauthorized listening ports on the network systems
B . How long does it take to remove unauthorized software from the organization’s systems
C . What percentage of the organization’s applications are using sandboxing products
D . What percentage of assets will have their settings enforced and redeployed
E . What percentage of systems in the organization are using Network Level Authentication (NLA)

Answer: D

Exit mobile version