Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?

A. malware management
B. inventory permissions
C. application whitelist
D. application control


Answer: C

Computer Science & Information Technology

You might also like to view...

A computer can have a permanently assigned ____ IP address.

A. standard B. flexible C. static D. dynamic

Computer Science & Information Technology

If you change your mind about the theme you selected for a presentation, you can change it by clicking the _______ tab, then clicking any theme from the Themes group.

A. HOME B. PREVIEW C. VIEW D. DESIGN

Computer Science & Information Technology

Which of the following DATE_FORMAT() format codes denotes the day of the year, numeric?

a. %j b. %p c. %Y d. %D

Computer Science & Information Technology

____________________ is a security measure that uses the public network infrastructure, such as the Internet, as part of a Virtual Private Network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology