Question 16
What is the business goal of the Inventory and Control of Software Assets Control?
Question 17
An organization is implementing an application software security control their custom-written code that provides web-based database access to sales partners. Which action will help mitigate the risk of the application being compromised?
Question 18
Beta corporation is doing a core evaluation of its centralized logging capabilities. The security staff suspects that the central server has several log files over the past few weeks that have had their contents changed. Given this concern, and the need to keep archived logs for log correction applications, what is the most appropriate next steps?
Question 19
Which of the following best describes the CIS Controls?
Question 20
Which projects enumerates or maps security issues to CVE?