Question: 2 . What do you do about 3 rd party components on the network? In other words a . How do you identify unpatched hardware

2. What do you do about 3rd party components on the network? In other words
a. How do you identify unpatched hardware or software on the network?
b. What does incident response (notification) look like? (Describe a business process & provide a reference)
c. How do you take action on something you dont own on the network? (Describe a business process & provide a reference)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!