Q: 18
DRAG DROP Drag and drop the mitigation steps from the left onto the vulnerabilities they mitigate on the right.
Drag & Drop
Discussion
Utilize application control -> End-user desktops allow the execution of non-approved applications, Patch applications -> Application security vulnerabilities, Restrict admin access -> Privileged accounts have full rights, MFA -> User verification is weak, Backup settings retention -> Data or access loss occurs. Not totally sure but this matches what I've seen in some practice sets. Can someone confirm?
Utilize application control -> End-user desktops, Patch apps -> Application vulnerabilities, Restrict admin access -> Privilege accounts, MFA -> User verification is weak, Backup retention -> Data/access loss. Pretty sure this is correct based on similar exam reports. Watch out-patching looks tempting for desktops but controls is the key there.
Be respectful. No spam.
