Question 16

What is the business goal of the Inventory and Control of Software Assets Control?
  • Question 17

    An organization is implementing an application software security control their custom-written code that provides web-based database access to sales partners. Which action will help mitigate the risk of the application being compromised?
  • Question 18

    Beta corporation is doing a core evaluation of its centralized logging capabilities. The security staff suspects that the central server has several log files over the past few weeks that have had their contents changed. Given this concern, and the need to keep archived logs for log correction applications, what is the most appropriate next steps?
  • Question 19

    Which of the following best describes the CIS Controls?
  • Question 20

    Which projects enumerates or maps security issues to CVE?