5.9k views
3 votes
Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access to the network is an example of what security method?

User JFerro
by
4.7k points

1 Answer

0 votes

Answer:

It is an example of CIS Control.

Step-by-step explanation:

The CIS RAM is an information scurity risk assessment method that helps organizations implement and assess their security posture against the CIS controls.

User Jakobandersen
by
4.6k points