As part of an effort to implement a control on E-mail and Web Protections, an organization is monitoring their webserver traffic. Which event should they receive an alert on?
Which of the following CIS Controls is used to manage the security lifecycle by validating that the documented controls are in place?
Which of the following assigns a number indicating the severity of a discovered software vulnerability?
Which of the following will decrease the likelihood of eavesdropping on a wireless network?
What is the list displaying?
An organization is implementing an application software security control their custom-written code that provides web—based database access to sales partners. Which action will help mitigate the risk of the application being compromised?
Implementing which of the following will decrease spoofed e-mail messages?
An organization has failed a test for compliance with a policy of continual detection and removal of malicious software on its network. Which of the following errors is the root cause?
Which of the following actions will assist an organization specifically with implementing web application software security?
An organization has created a policy that allows software from an approved list of applications to be installed on workstations. Programs not on the list should not be installed. How can the organization best monitor compliance with the policy?
To effectively implement the Data Protection CIS Control, which task needs to be implemented first?
An organization is implementing a control for the Limitation and Control of Network Ports, Protocols, and Services CIS Control. Which action should they take when they discover that an application running on a web server is no longer needed?
What is a zero-day attack?