Which type of scan is best able to determine if user workstations are missing any important patches?
Correct Answer:E
What is the relationship between a service and its associated port?
Correct Answer:D
An organization has created a policy that allows software from an approved list of applications to be installed on workstations. Programs not on the list should not be installed. How can the organization best monitor compliance with the policy?
Correct Answer:C
Which of the following actions would best mitigate against phishing attempts such as the example below?
Correct Answer:C
What is the first step suggested before implementing any single CIS Control?
Correct Answer:B
Which of the following baselines is considered necessary to implement the Boundary Defense CIS Control?
Correct Answer:D