Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What could a security team use the command line tool Nmap for when implementing the Inventory and Control of Hardware Assets Control?

A.

Control which devices can connect to the network

B.

Passively identify new devices

C.

Inventory offline databases

D.

Actively identify new servers

Scan 1 was taken on Monday. Scan 2 was taken of the same network on Wednesday. Which of the following findings is accurate based on the information contained in the scans?

A.

The host located at 192.168.177.7 is no longer on the network

B.

The host with MAC Address D8:50:E6:9F:EE:60 is no longer on the network

C.

The host located at 192.168.177.21 is a new host on the network

D.

The host with MAC Address D8:50:E6:9F:EE:60 had an IP address change

Acme Corporation performed an investigation of its centralized logging capabilities. It found that the central server is missing several types of logs from three servers in Acme's inventory. Given these findings, what is the most appropriate next step?

A.

Define processes to manually review logs for the problem servers

B.

Restart or reinstall the logging service on each of the problem servers

C.

Perform analysis to identify the source of the logging problems

D.

Document the missing logs in the core evaluation report as a minor issue

An organization has implemented a control for Controlled Use of Administrative Privilege. The control requires users to enter a password from their own user account before being allowed elevated privileges, and that no client applications (e.g. web browsers, e-mail clients) can be run with elevated privileges. Which of the following actions will validate this control is implemented properly?

A.

Check the log entries to match privilege use with access from authorized users.

B.

Run a script at intervals to identify processes running with administrative privilege.

C.

Force the root account to only be accessible from the system console.

What is a zero-day attack?

A.

An attack that has a known attack signature but no available patch

B.

An attack that utilizes a vulnerability unknown to the software developer

C.

An attack that deploys at the end of a countdown sequence

D.

An attack that is launched the day the patch is released

Which of the following will decrease the likelihood of eavesdropping on a wireless network?

A.

Broadcasting in the 5Ghz frequency

B.

Using Wired Equivalent Protocol (WEP)

C.

Using EAP/TLS authentication and WPA2 with AES encryption

D.

Putting the wireless network on a separate VLAN

Kenya is a system administrator for SANS. Per the recommendations of the CIS Controls she has a dedicated host (kenya- adminbox / 10.10.10.10) for any administrative tasks. She logs into the dedicated host with her domain admin credentials. Which of the following connections should not exist from kenya-adminbox?

A.

10.10.245.3389

B.

Mail.jane.org.25

C.

Firewall_charon.jane.org.22

D.

10.10.10.33.443

Which CIS Control includes storing system images on a hardened server, scanning production systems for out-of-date software, and using file integrity assessment tools like tripwire?

A.

Inventory of Authorized and Unauthorized Software

B.

Continuous Vulnerability Management

C.

Secure Configurations for Network Devices such as Firewalls, Routers and Switches

D.

Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

Which approach is recommended by the CIS Controls for performing penetration tests?

A.

Document a single vulnerability per system

B.

Utilize a single attack vector at a time

C.

Complete intrusive tests on test systems

D.

Execute all tests during network maintenance windows

Acme Corporation is doing a core evaluation of its centralized logging capabilities. Which of the following scenarios indicates a failure in more than one CIS Control?

A.

The loghost is missing logs from 3 servers in the inventory

B.

The loghost is receiving logs from hosts with different timezone values

C.

The loghost time is out-of-sync with an external host

D.

The loghost is receiving out-of-sync logs from undocumented servers