Which of the following should be measured and analyzed regularly when implementing the Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers CIS Control?
A . How long does it take to identify new unauthorized listening ports on the network systems
B . How long does it take to remove unauthorized software from the organization’s systems
C . What percentage of the organization’s applications are using sandboxing products
D . What percentage of assets will have their settings enforced and redeployed
E . What percentage of systems in the organization are using Network Level Authentication (NLA)
Answer: D