Which of the following archiving methods would maximize log integrity?
Correct Answer:A
Acme Corporation is doing a core evaluation of its centralized logging capabilities. Which of the following scenarios indicates a failure in more than one CIS Control?
Correct Answer:D
What is a recommended defense for the CIS Control for Application Software Security?
Correct Answer:C
Which of the following actions produced the output seen below?
Correct Answer:B
A breach was discovered after several customers reported fraudulent charges on their accounts. The attacker had exported customer logins and cracked passwords that were hashed but not salted. Customers were made to reset their passwords.
Shortly after the systems were cleaned and restored to service, it was discovered that a compromised system administrator??s account was being used to give the attacker continued access to the network. Which CIS Control failed in the continued access to the network?
Correct Answer:C