GCCC Exam Question 6

Which of the following CIS Controls is used to manage the security lifecycle by validating that the documented controls are in place?
  • GCCC Exam Question 7

    An attacker is able to successfully access a web application as root using ' or 1 = 1 . as the password. The successful access indicates a failure of what process?
  • GCCC Exam Question 8

    John is implementing a commercial backup solution for his organization. Which of the following steps should be on the configuration checklist?
  • GCCC Exam Question 9

    An organization is implementing a control for the Account Monitoring and Control CIS Control, and have set the Account Lockout Policy as shown below. What is the risk presented by these settings?
  • GCCC Exam Question 10

    DHCP logging output in the screenshot would be used for which of the following?