What type of Unified Modelling Language (UML) diagram is used to show dependencies between
logical groupings in a system?
A
IDS alerts at Service Industries are received by email. A typical day process over 300 emails with
fewer than 50 requiring action. A recent attack was successful and went unnoticed due to the
number of generated alerts. What should be done to prevent this from recurring?
A
Janice is auditing the perimeter of the network at Sugar Water InC. According to documentation,
external SMTP traffic is only allowed to and from 10.10.10.25. Which of the following actions would
demonstrate the rules are configured incorrectly?
C
Which of the following should be used to test antivirus software?
D
Which of the following is necessary to automate a control for Inventory and Control of Hardware
Assets?
A
Which of the following CIS Controls is used to manage the security lifecycle by validating that the
documented controls are in place?
D
When evaluating the Wireless Access Control CIS Control, which of the following systems needs to be
tested?
B
As part of an effort to implement a control on E-mail and Web Protections, an organization is
monitoring their webserver traffic. Which event should they receive an alert on?
C
Which of the following items would be used reactively for incident response?
B
Below is a screenshot from a deployed next-generation firewall. These configuration settings would
be a defensive measure for which CIS Control?
C