GCCC Exam Question 6
Which of the following CIS Controls is used to manage the security lifecycle by validating that the documented controls are in place?
GCCC Exam Question 7
An attacker is able to successfully access a web application as root using ' or 1 = 1 . as the password. The successful access indicates a failure of what process?
GCCC Exam Question 8
John is implementing a commercial backup solution for his organization. Which of the following steps should be on the configuration checklist?
GCCC Exam Question 9
An organization is implementing a control for the Account Monitoring and Control CIS Control, and have set the Account Lockout Policy as shown below. What is the risk presented by these settings?


GCCC Exam Question 10
DHCP logging output in the screenshot would be used for which of the following?

