Which event should they receive an alert on?
As part of an effort to implement a control on E-mail and Web Protections, an organization is monitoring their webserver traffic. Which event should they receive an alert on?A . The number of website...
As part of an effort to implement a control on E-mail and Web Protections, an organization is monitoring their webserver traffic. Which event should they receive an alert on?A . The number of website...
Which of the following actions produced the output seen below?A . An access rule was removed from firewallrules.txtB . An access rule was added to firewallrules2.txtC . An access rule was added to firewallrules.txtD...
According to attack lifecycle models, what is the attacker’s first step in compromising an organization?A . Privilege EscalationB . ExploitationC . Initial CompromiseD . ReconnaissanceView AnswerAnswer: D
Below is a screenshot from a deployed next-generation firewall. These configuration settings would be a defensive measure for which CIS Control?A . Controlled Access Based on the Need to KnowB . Limitation and Control...
Which of the following actions would best mitigate against phishing attempts such as the example below?A . Establishing email filters to block no-reply address emailsB . Making web filters to prevent accessing Google DocsC...
An organization is implementing a control within the Application Software Security CIS Control. How can they best protect against injection attacks against their custom web application and database applications?A . Ensure the web application...
A security incident investigation identified the following modified version of a legitimate system file on a compromised client: C:WindowsSystem32winxml.dll Addition Jan. 16, 2014 4:53:11 PM The infection vector was determined to be a vulnerable...
What type of Unified Modelling Language (UML) diagram is used to show dependencies between logical groupings in a system?A . Package diagramB . Deployment diagramC . Class diagramD . Use case diagramView AnswerAnswer: A
Kenya is a system administrator for SANS. Per the recommendations of the CIS Controls she has a dedicated host (kenya- adminbox / 10.10.10.10) for any administrative tasks. She logs into the dedicated host with...
What is the list displaying?A . Allowed program in a software inventory applicationB . Unauthorized programs detected in a software inventoryC . Missing patches from a patching serverD . Installed software on an end-user...