A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?
To ensure that all systems requiring the patch are updated, the systems administrator must maintain an accurate asset inventory. This inventory lists all hardware and software assets within the organization, allowing the administrator to identify which systems are affected by the patch and ensuring that none are missed during the update process.
Network enumeration is used to discover devices on a network but doesn't track software that requires patching.
Data certification and procurement process are unrelated to tracking systems for patching purposes.
Ty
3 months agoDustin
3 months agoNovella
3 months agoLinn
4 months agoFrederic
4 months agoGermaine
4 months agoNorah
4 months agoRessie
4 months agoSanjuana
5 months agoKenneth
5 months agoMonte
5 months agoRene
5 months agoYvette
5 months agoKanisha
5 months agoSerina
9 months agoLarue
8 months agoOlive
8 months agoCecily
8 months agoLeota
10 months agoLeanora
9 months agoPete
9 months agoEzekiel
9 months agoJamie
10 months agoReid
9 months agoKenneth
9 months agoAudry
10 months agoAndra
10 months agoLeota
10 months agoNohemi
10 months agoQuentin
10 months agoTamie
11 months agoElza
11 months agoTheodora
11 months ago