Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access to the network is an example of what security method?

Respuesta :

Answer:

It is an example of CIS Control.

Explanation:

The CIS RAM is an information scurity risk  assessment method that helps organizations implement and assess their security posture against the CIS controls.