How often should the security awareness program be communicated to employees?
An organization is implementing an application software security control their custom-written code that provides web—based database access to sales partners. Which action will help mitigate the risk of the application being compromised?
Which of the following baselines is considered necessary to implement the Boundary Defense CIS Control?
What could a security team use the command line tool Nmap for when implementing the Inventory and Control of Hardware Assets Control?
John a network administrator at Northeast High School. Faculty have been complaining that although they can detect and authenticate to the faculty wireless network, they are unable to connect. While troubleshooting, John discovers that the wireless network server is out of DHCP addresses due to a large number of unauthorized student devices connecting to the network. Which course of action would be an effective temporary stopgap to secure the network until a permanent solution can be found?
Implementing which of the following will decrease spoofed e-mail messages?
Which of the following statements is appropriate in an incident response report?
An organization has implemented a policy to continually detect and remove malware from its network. Which of the following is a detective control needed for this?
What is a zero-day attack?
Which of the following CIS Controls is used to manage the security lifecycle by validating that the documented controls are in place?