Question 31

Which of the following is used to prevent spoofing of e-mail addresses?
  • Question 32

    An organization is implementing a control for the Account Monitoring and Control CIS Control, and have set the Account Lockout Policy as shown below. What is the risk presented by these settings?
  • Question 33

    An auditor is focusing on potential vulnerabilities. Which of the following should cause an alert?
  • Question 34

    An organization has failed a test for compliance with a policy of continual detection and removal of malicious software on its network. Which of the following errors is the root cause?