GCCC Exam Question 21

If an attacker wanted to dump hashes or run wmic commands on a target machine, which of the following tools would he use?
  • GCCC Exam Question 22

    Which CIS Control includes storing system images on a hardened server, scanning production systems for out-of-date software, and using file integrity assessment tools like tripwire?
  • GCCC Exam Question 23

    Scan 1 was taken on Monday. Scan 2 was taken of the same network on Wednesday. Which of the following findings is accurate based on the information contained in the scans?
  • GCCC Exam Question 24

    Which of the following will decrease the likelihood of eavesdropping on a wireless network?
  • GCCC Exam Question 25

    An analyst investigated unused organizational accounts. The investigation found that:
    -10% of accounts still have their initial login password, indicating they were never used
    -10% of accounts have not been used in over six months
    Which change in policy would mitigate the security risk associated with both findings?