GIAC GCCC Question Answer
How does an organization's hardware inventory support the control for secure configurations?
It provides a list of managed devices that should be secured
It provides a list of unauthorized devices on the network
It provides the MAC addresses for insecure network adapters
It identifies the life cycle of manufacturer support for hardware devices
TESTED 06 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved