An organization has implemented a policy to detect and remove malicious software from its
network. Which of the following actions is focused on correcting rather than preventing attack?
B
Beta corporation is doing a core evaluation of its centralized logging capabilities. The security staff
suspects that the central server has several log files over the past few weeks that have had their
contents changed. Given this concern, and the need to keep archived logs for log correction
applications, what is the most appropriate next steps?
B
Which projects enumerates or maps security issues to CVE?
A
Which of the following archiving methods would maximize log integrity?
A
Which of the following is a responsibility of a change management board?
B
Which of the following is a benefit of stress-testing a network?
A
An organization has implemented a control for Controlled Use of Administrative Privilege. The
control requires users to enter a password from their own user account before being allowed
elevated privileges, and that no client applications (e.g. web browsers, e-mail clients) can be run
with elevated privileges. Which of the following actions will validate this control is implemented
properly?
B
A security incident investigation identified the following modified version of a legitimate system file
on a compromised client:
C:\Windows\System32\winxml.dll Addition Jan. 16, 2014 4:53:11 PM
The infection vector was determined to be a vulnerable browser plug-in installed by the user. Which
of the organization’s CIS Controls failed?
B
An organization is implementing a control for the Account Monitoring and Control CIS Control, and
have set the Account Lockout Policy as shown below. What is the risk presented by these settings?
B
An organization has implemented a control for Controlled Use of Administrative Privileges. They are
collecting audit data for each login, logout, and location for the root account of their MySQL server,
but they are unable to attribute each of these logins to a specific user. What action can they take to
rectify this?
C
What type of Unified Modelling Language (UML) diagram is used to show dependencies between
logical groupings in a system?
A
IDS alerts at Service Industries are received by email. A typical day process over 300 emails with
fewer than 50 requiring action. A recent attack was successful and went unnoticed due to the
number of generated alerts. What should be done to prevent this from recurring?
A
Janice is auditing the perimeter of the network at Sugar Water InC. According to documentation,
external SMTP traffic is only allowed to and from 10.10.10.25. Which of the following actions would
demonstrate the rules are configured incorrectly?
C
Which of the following should be used to test antivirus software?
D
Which of the following is necessary to automate a control for Inventory and Control of Hardware
Assets?
A