Question 21

Which of the following assigns a number indicating the severity of a discovered software vulnerability?
  • Question 22

    Which activity increases the risk of a malware infection?
  • Question 23

    A security incident investigation identified the following modified version of a legitimate system file on a compromised client:
    C:\Windows\System32\winxml.dll Addition Jan. 16, 2014 4:53:11 PM
    The infection vector was determined to be a vulnerable browser plug-in installed by the user. Which of the organization's CIS Controls failed?
  • Question 24

    An Internet retailer's database was recently exploited by a foreign criminal organization via a remote attack.
    The initial exploit resulted in immediate root-level access. What could have been done to prevent this level of access being given to the intruder upon successful exploitation?
  • Question 25

    An organization has implemented a control for Controlled Use of Administrative Privilege. The control requires users to enter a password from their own user account before being allowed elevated privileges, and that no client applications (e.g. web browsers, e-mail clients) can be run with elevated privileges. Which of the following actions will validate this control is implemented properly?