Question 31
Which of the following is used to prevent spoofing of e-mail addresses?
Question 32
An organization is implementing a control for the Account Monitoring and Control CIS Control, and have set the Account Lockout Policy as shown below. What is the risk presented by these settings?


Question 33
An auditor is focusing on potential vulnerabilities. Which of the following should cause an alert?
Question 34
An organization has failed a test for compliance with a policy of continual detection and removal of malicious software on its network. Which of the following errors is the root cause?