Save
Practice questions for this set
Learn 1 /7 Study using Learn
Asset management policy
Choose an answer
What is configuration baseline used Which of the following is NOT a
1 2
for? wireless authentication protocol?
What policy is referenced if a laptop is
3 4 What is hardening?
lost or stolen?
Don't know?
Terms in this set (61)
What is configuration baseline used To establish a known secure system state
for?
What is the purpose of security logs? To detect changes, anomalies, or malicious activity
What is change management used To control and document modifications to systems
for?
, What is version control used for? To track and revert code or configuration changes
What is hardening? Reducing attack surface by disabling unnecessary
services and settings
What does vulnerability scanning Known weaknesses and misconfigurations
detect?
What is a patch? Code released to fix security flaws or bugs
What is compliance auditing? Verification that organizational systems meet
regulations and standards
What is an example of compensating Adding monitoring when a missing technical control
control? cannot be implemented
What is the primary purpose of SIEM? Aggregating and correlating security log data
Which WPA3 feature reduces brute- SAE
forcing of weak PSKs?
Which wireless method should never WEP
be used due to weak IVs?
Which of the following is NOT a PEEP
wireless authentication protocol?
Biometrics on mobile devices should Convenience features
be considered what?
Which wireless attack steals a phone's Bluesnarfing
contact list?
What triggers an action when a device Geofencing
enters a location boundary?