Question 1
What is a recommended defense for the CIS Control for Application Software Security?
Question 2
What tool creates visual network topology output and results that can be analyzed by Ndiff to determine if a service or network asset has changed?
Question 3
Which of the following baselines is considered necessary to implement the Boundary Defense CIS Control?
Question 4
If an attacker wanted to dump hashes or run wmic commands on a target machine, which of the following tools would he use?
Question 5
An analyst investigated unused organizational accounts. The investigation found that:
-10% of accounts still have their initial login password, indicating they were never used
-10% of accounts have not been used in over six months
Which change in policy would mitigate the security risk associated with both findings?
-10% of accounts still have their initial login password, indicating they were never used
-10% of accounts have not been used in over six months
Which change in policy would mitigate the security risk associated with both findings?