Answer:
Create an microsoft intune for remote management of the device
Explanation:
Microsoft intune is a server based management that grants an authorized user or group limited access to information in its database.
Setting up a intune in new acquired devices (it is called bulk enroll) is as easy as connecting a usb to the device and clicking install on the administrator PC. While already existing devices would have to create an account as individual users.
Answer:
A satellite that can be controlled where to go.
Explanation:
Not necessarily, if you are sourcing the information you have used to come to your own conclusion then that isn't plagiarism, however if you just copy paste completely and use it as your own work then yes it is plagiarism. <span />
Answer:
D. Network vulnerability database
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.
Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.