GIAC Related Exams
GCCC Exam
A security incident investigation identified the following modified version of a legitimate system file on a compromised client:
C:\Windows\System32\winxml.dll Addition Jan. 16, 2014 4:53:11 PM
The infection vector was determined to be a vulnerable browser plug-in installed by the user. Which of the organization’s CIS Controls failed?
A need has been identified to organize and control access to different classifications of information stored on a fileserver. Which of the following approaches will meet this need?
What is a recommended defense for the CIS Control for Application Software Security?