GIAC GCCC Question Answer
How does an organization's hardware inventory support the control for secure configurations?
It provides a list of managed devices that should be secured
It provides a list of unauthorized devices on the network
It provides the MAC addresses for insecure network adapters
It identifies the life cycle of manufacturer support for hardware devices
TESTED 24 Feb 2026
Copyright © 2014-2026 ACE4Sure. All Rights Reserved