Question 1

What is a recommended defense for the CIS Control for Application Software Security?
  • Question 2

    What tool creates visual network topology output and results that can be analyzed by Ndiff to determine if a service or network asset has changed?
  • Question 3

    Which of the following baselines is considered necessary to implement the Boundary Defense CIS Control?
  • Question 4

    If an attacker wanted to dump hashes or run wmic commands on a target machine, which of the following tools would he use?
  • Question 5

    An analyst investigated unused organizational accounts. The investigation found that:
    -10% of accounts still have their initial login password, indicating they were never used
    -10% of accounts have not been used in over six months
    Which change in policy would mitigate the security risk associated with both findings?