{"id":18183,"date":"2021-01-16T02:50:12","date_gmt":"2021-01-16T02:50:12","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=18183"},"modified":"2021-01-16T02:50:15","modified_gmt":"2021-01-16T02:50:15","slug":"giac-critical-controls-certification-gccc-gccc-dumps","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/giac-critical-controls-certification-gccc-gccc-dumps.html","title":{"rendered":"GIAC Critical Controls Certification (GCCC) GCCC Dumps"},"content":{"rendered":"\n<p>GIAC Critical Controls Certification (GCCC) certification is hot, which ensures that candidates have the knowledge and skills to implement and execute the Critical Security Controls recommended by the Council on Cybersecurity, and perform audits based on the standard. It is the only certification based on the Critical Security Controls, a prioritized, risk-based approach to security. To pass GCCC exam, you can get GIAC GCCC exam dumps questions online to read 93 exam questions and answers. We ensure that you can pass GIAC Critical Controls Certification (GCCC) exam successfully.<\/p>\n<h2>GIAC Certification <span style=\"color: #ff0000;\">GCCC Free Dumps<\/span> Are Online For Checking<\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam5095\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-5095\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-5095\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-164624'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Dragonfly Industries requires firewall rules to go through a change management system before they are configured. Review the change management log. <br \/>\r<br><br><img decoding=\"async\" width=649 height=90 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2021\/01\/image002-48.jpg\" v:shapes=\"_x0000_i1025\"><br><br \/>\r<br>Which of the following lines in your firewall ruleset has expired and should be removed from the configuration?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='164624' \/><input type='hidden' id='answerType164624' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164624[]' id='answer-id-667344' class='answer   answerof-164624 ' value='667344'   \/><label for='answer-id-667344' id='answer-label-667344' class=' answer'><span>access-list outbound permit tcp host 10.1.1.7 any eq smtp<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164624[]' id='answer-id-667345' class='answer   answerof-164624 ' value='667345'   \/><label for='answer-id-667345' id='answer-label-667345' class=' answer'><span>access-list outbound deny tcp any host 74.125.228.2 eq www<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164624[]' id='answer-id-667346' class='answer   answerof-164624 ' value='667346'   \/><label for='answer-id-667346' id='answer-label-667346' class=' answer'><span>access-list inbound permit tcp 8.8.0.0 0.0.0.255 10.10.12.252 eq 8080<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164624[]' id='answer-id-667347' class='answer   answerof-164624 ' value='667347'   \/><label for='answer-id-667347' id='answer-label-667347' class=' answer'><span>access-list inbound permit tcp host 8.8.207.97 host 10.10.12.100 eq ssh<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-164625'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>Which of the following actions produced the output seen below? <br \/>\r<br><br><img decoding=\"async\" width=649 height=107 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2021\/01\/image004-37.jpg\" v:shapes=\"_x0000_i1026\"><br><\/div><input type='hidden' name='question_id[]' id='qID_2' value='164625' \/><input type='hidden' id='answerType164625' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164625[]' id='answer-id-667348' class='answer   answerof-164625 ' value='667348'   \/><label for='answer-id-667348' id='answer-label-667348' class=' answer'><span>An access rule was removed from firewallrules.txt<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164625[]' id='answer-id-667349' class='answer   answerof-164625 ' value='667349'   \/><label for='answer-id-667349' id='answer-label-667349' class=' answer'><span>An access rule was added to firewallrules2.txt<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164625[]' id='answer-id-667350' class='answer   answerof-164625 ' value='667350'   \/><label for='answer-id-667350' id='answer-label-667350' class=' answer'><span>An access rule was added to firewallrules.txt<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164625[]' id='answer-id-667351' class='answer   answerof-164625 ' value='667351'   \/><label for='answer-id-667351' id='answer-label-667351' class=' answer'><span>An access rule was removed from firewallrules2.txt<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-164626'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>An organization has implemented a policy to detect and remove malicious software from its network. <br \/>\r<br>Which of the following actions is focused on correcting rather than preventing attack?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='164626' \/><input type='hidden' id='answerType164626' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164626[]' id='answer-id-667352' class='answer   answerof-164626 ' value='667352'   \/><label for='answer-id-667352' id='answer-label-667352' class=' answer'><span>Configuring a firewall to only allow communication to whitelisted hosts and ports<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164626[]' id='answer-id-667353' class='answer   answerof-164626 ' value='667353'   \/><label for='answer-id-667353' id='answer-label-667353' class=' answer'><span>Using Network access control to disable communication by hosts with viruses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164626[]' id='answer-id-667354' class='answer   answerof-164626 ' value='667354'   \/><label for='answer-id-667354' id='answer-label-667354' class=' answer'><span>Disabling autorun features on all workstations on the network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164626[]' id='answer-id-667355' class='answer   answerof-164626 ' value='667355'   \/><label for='answer-id-667355' id='answer-label-667355' class=' answer'><span>Training users to recognize potential phishing attempts<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-164627'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>An Internet retailer's database was recently exploited by a foreign criminal organization via a remote attack. The initial exploit resulted in immediate root-level access. <br \/>\r<br>What could have been done to prevent this level of access being given to the intruder upon successful exploitation?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='164627' \/><input type='hidden' id='answerType164627' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164627[]' id='answer-id-667356' class='answer   answerof-164627 ' value='667356'   \/><label for='answer-id-667356' id='answer-label-667356' class=' answer'><span>Configure the DMZ firewall to block unnecessary service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164627[]' id='answer-id-667357' class='answer   answerof-164627 ' value='667357'   \/><label for='answer-id-667357' id='answer-label-667357' class=' answer'><span>Install host integrity monitoring software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164627[]' id='answer-id-667358' class='answer   answerof-164627 ' value='667358'   \/><label for='answer-id-667358' id='answer-label-667358' class=' answer'><span>Install updated anti-virus software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164627[]' id='answer-id-667359' class='answer   answerof-164627 ' value='667359'   \/><label for='answer-id-667359' id='answer-label-667359' class=' answer'><span>Configure the database to run with lower privileges<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-164628'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>As part of an effort to implement a control on E-mail and Web Protections, an organization is monitoring their webserver traffic. <br \/>\r<br>Which event should they receive an alert on?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='164628' \/><input type='hidden' id='answerType164628' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164628[]' id='answer-id-667360' class='answer   answerof-164628 ' value='667360'   \/><label for='answer-id-667360' id='answer-label-667360' class=' answer'><span>The number of website hits is higher that the daily average<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164628[]' id='answer-id-667361' class='answer   answerof-164628 ' value='667361'   \/><label for='answer-id-667361' id='answer-label-667361' class=' answer'><span>The logfiles of the webserver are rotated and archived<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164628[]' id='answer-id-667362' class='answer   answerof-164628 ' value='667362'   \/><label for='answer-id-667362' id='answer-label-667362' class=' answer'><span>The website does not respond to a SYN packet for 30 minutes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164628[]' id='answer-id-667363' class='answer   answerof-164628 ' value='667363'   \/><label for='answer-id-667363' id='answer-label-667363' class=' answer'><span>The website issues a RST to a client after the connection is idle<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-164629'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>Implementing which of the following will decrease spoofed e-mail messages?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='164629' \/><input type='hidden' id='answerType164629' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164629[]' id='answer-id-667364' class='answer   answerof-164629 ' value='667364'   \/><label for='answer-id-667364' id='answer-label-667364' class=' answer'><span>Finger Protocol<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164629[]' id='answer-id-667365' class='answer   answerof-164629 ' value='667365'   \/><label for='answer-id-667365' id='answer-label-667365' class=' answer'><span>Sender Policy Framework<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164629[]' id='answer-id-667366' class='answer   answerof-164629 ' value='667366'   \/><label for='answer-id-667366' id='answer-label-667366' class=' answer'><span>Network Address Translation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164629[]' id='answer-id-667367' class='answer   answerof-164629 ' value='667367'   \/><label for='answer-id-667367' id='answer-label-667367' class=' answer'><span>Internet Message Access Protocol<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-164630'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>After installing a software package on several workstations, an administrator discovered the software opened network port TCP 23456 on each workstation. The port is part of a software management function that is not needed on corporate workstations. <br \/>\r<br>Which actions would best protect the computers with the software package installed?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='164630' \/><input type='hidden' id='answerType164630' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164630[]' id='answer-id-667368' class='answer   answerof-164630 ' value='667368'   \/><label for='answer-id-667368' id='answer-label-667368' class=' answer'><span>Document the port number and request approval from a change control group<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164630[]' id='answer-id-667369' class='answer   answerof-164630 ' value='667369'   \/><label for='answer-id-667369' id='answer-label-667369' class=' answer'><span>Redirect traffic to and from the software management port to a non-default port<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164630[]' id='answer-id-667370' class='answer   answerof-164630 ' value='667370'   \/><label for='answer-id-667370' id='answer-label-667370' class=' answer'><span>Block TCP 23456 at the network perimeter firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164630[]' id='answer-id-667371' class='answer   answerof-164630 ' value='667371'   \/><label for='answer-id-667371' id='answer-label-667371' class=' answer'><span>Determine which service controls the software management function and opens the port, and disable it<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-164631'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>Given the audit finding below, which CIS Control was being measured? <br \/>\r<br><br><img decoding=\"async\" width=650 height=37 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2021\/01\/image006-32.jpg\" v:shapes=\"_x0000_i1027\"><br><\/div><input type='hidden' name='question_id[]' id='qID_8' value='164631' \/><input type='hidden' id='answerType164631' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164631[]' id='answer-id-667372' class='answer   answerof-164631 ' value='667372'   \/><label for='answer-id-667372' id='answer-label-667372' class=' answer'><span>Controlled Access Based on the Need to Know<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164631[]' id='answer-id-667373' class='answer   answerof-164631 ' value='667373'   \/><label for='answer-id-667373' id='answer-label-667373' class=' answer'><span>Controlled Use of Administrative Privilege<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164631[]' id='answer-id-667374' class='answer   answerof-164631 ' value='667374'   \/><label for='answer-id-667374' id='answer-label-667374' class=' answer'><span>Limitation and Control of Network Ports, Protocols and Services<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164631[]' id='answer-id-667375' class='answer   answerof-164631 ' value='667375'   \/><label for='answer-id-667375' id='answer-label-667375' class=' answer'><span>Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164631[]' id='answer-id-667376' class='answer   answerof-164631 ' value='667376'   \/><label for='answer-id-667376' id='answer-label-667376' class=' answer'><span>Inventory and Control of Hardware Assets<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-164632'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>According to attack lifecycle models, what is the attacker\u2019s first step in compromising an organization?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='164632' \/><input type='hidden' id='answerType164632' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164632[]' id='answer-id-667377' class='answer   answerof-164632 ' value='667377'   \/><label for='answer-id-667377' id='answer-label-667377' class=' answer'><span>Privilege Escalation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164632[]' id='answer-id-667378' class='answer   answerof-164632 ' value='667378'   \/><label for='answer-id-667378' id='answer-label-667378' class=' answer'><span>Exploitation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164632[]' id='answer-id-667379' class='answer   answerof-164632 ' value='667379'   \/><label for='answer-id-667379' id='answer-label-667379' class=' answer'><span>Initial Compromise<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164632[]' id='answer-id-667380' class='answer   answerof-164632 ' value='667380'   \/><label for='answer-id-667380' id='answer-label-667380' class=' answer'><span>Reconnaissance<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-164633'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Which of the following items would be used reactively for incident response?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='164633' \/><input type='hidden' id='answerType164633' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164633[]' id='answer-id-667381' class='answer   answerof-164633 ' value='667381'   \/><label for='answer-id-667381' id='answer-label-667381' class=' answer'><span>A schedule for creating and storing backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164633[]' id='answer-id-667382' class='answer   answerof-164633 ' value='667382'   \/><label for='answer-id-667382' id='answer-label-667382' class=' answer'><span>A phone tree used to contact necessary personnel<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164633[]' id='answer-id-667383' class='answer   answerof-164633 ' value='667383'   \/><label for='answer-id-667383' id='answer-label-667383' class=' answer'><span>A script used to verify patches are installed on systems<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164633[]' id='answer-id-667384' class='answer   answerof-164633 ' value='667384'   \/><label for='answer-id-667384' id='answer-label-667384' class=' answer'><span>An IPS rule that prevents web access from international locations<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-164634'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>A security incident investigation identified the following modified version of a legitimate system file on a compromised client: <br \/>\r<br>C:WindowsSystem32winxml.dll Addition Jan. 16, 2014 4:53:11 PM <br \/>\r<br>The infection vector was determined to be a vulnerable browser plug-in installed by the user. <br \/>\r<br>Which of the organization\u2019s CIS Controls failed?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='164634' \/><input type='hidden' id='answerType164634' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164634[]' id='answer-id-667385' class='answer   answerof-164634 ' value='667385'   \/><label for='answer-id-667385' id='answer-label-667385' class=' answer'><span>Application Software Security<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164634[]' id='answer-id-667386' class='answer   answerof-164634 ' value='667386'   \/><label for='answer-id-667386' id='answer-label-667386' class=' answer'><span>Inventory and Control of Software Assets<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164634[]' id='answer-id-667387' class='answer   answerof-164634 ' value='667387'   \/><label for='answer-id-667387' id='answer-label-667387' class=' answer'><span>Maintenance, Monitoring, and Analysis of Audit Logs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164634[]' id='answer-id-667388' class='answer   answerof-164634 ' value='667388'   \/><label for='answer-id-667388' id='answer-label-667388' class=' answer'><span>Inventory and Control of Hardware Assets<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-164635'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>What type of Unified Modelling Language (UML) diagram is used to show dependencies between logical groupings in a system?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='164635' \/><input type='hidden' id='answerType164635' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164635[]' id='answer-id-667389' class='answer   answerof-164635 ' value='667389'   \/><label for='answer-id-667389' id='answer-label-667389' class=' answer'><span>Package diagram<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164635[]' id='answer-id-667390' class='answer   answerof-164635 ' value='667390'   \/><label for='answer-id-667390' id='answer-label-667390' class=' answer'><span>Deployment diagram<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164635[]' id='answer-id-667391' class='answer   answerof-164635 ' value='667391'   \/><label for='answer-id-667391' id='answer-label-667391' class=' answer'><span>Class diagram<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164635[]' id='answer-id-667392' class='answer   answerof-164635 ' value='667392'   \/><label for='answer-id-667392' id='answer-label-667392' class=' answer'><span>Use case diagram<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-164636'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>An organization is implementing a control within the Application Software Security CIS Control. <br \/>\r<br>How can they best protect against injection attacks against their custom web application and database applications?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='164636' \/><input type='hidden' id='answerType164636' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164636[]' id='answer-id-667393' class='answer   answerof-164636 ' value='667393'   \/><label for='answer-id-667393' id='answer-label-667393' class=' answer'><span>Ensure the web application server logs are going to a central log host<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164636[]' id='answer-id-667394' class='answer   answerof-164636 ' value='667394'   \/><label for='answer-id-667394' id='answer-label-667394' class=' answer'><span>Filter input to only allow safe characters and strings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164636[]' id='answer-id-667395' class='answer   answerof-164636 ' value='667395'   \/><label for='answer-id-667395' id='answer-label-667395' class=' answer'><span>Configure the web server to use Unicode characters only<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164636[]' id='answer-id-667396' class='answer   answerof-164636 ' value='667396'   \/><label for='answer-id-667396' id='answer-label-667396' class=' answer'><span>Check user input against a list of reserved database terms<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-164637'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>What is a recommended defense for the CIS Control for Application Software Security?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='164637' \/><input type='hidden' id='answerType164637' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164637[]' id='answer-id-667397' class='answer   answerof-164637 ' value='667397'   \/><label for='answer-id-667397' id='answer-label-667397' class=' answer'><span>Keep debugging code in production web applications for quick troubleshooting<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164637[]' id='answer-id-667398' class='answer   answerof-164637 ' value='667398'   \/><label for='answer-id-667398' id='answer-label-667398' class=' answer'><span>Limit access to the web application production environment to just the developers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164637[]' id='answer-id-667399' class='answer   answerof-164637 ' value='667399'   \/><label for='answer-id-667399' id='answer-label-667399' class=' answer'><span>Run a dedicated vulnerability scanner against backend databases<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164637[]' id='answer-id-667400' class='answer   answerof-164637 ' value='667400'   \/><label for='answer-id-667400' id='answer-label-667400' class=' answer'><span>Display system error messages for only non-kernel related events<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-164638'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>A need has been identified to organize and control access to different classifications of <br \/>\r<br>information stored on a fileserver. <br \/>\r<br>Which of the following approaches will meet this need?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='164638' \/><input type='hidden' id='answerType164638' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164638[]' id='answer-id-667401' class='answer   answerof-164638 ' value='667401'   \/><label for='answer-id-667401' id='answer-label-667401' class=' answer'><span>Organize files according to the user that created them and allow the user to determine permissions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164638[]' id='answer-id-667402' class='answer   answerof-164638 ' value='667402'   \/><label for='answer-id-667402' id='answer-label-667402' class=' answer'><span>Divide the documents into confidential, internal, and public folders, and ser permissions on each folder<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164638[]' id='answer-id-667403' class='answer   answerof-164638 ' value='667403'   \/><label for='answer-id-667403' id='answer-label-667403' class=' answer'><span>Set user roles by job or position, and create permission by role for each file<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164638[]' id='answer-id-667404' class='answer   answerof-164638 ' value='667404'   \/><label for='answer-id-667404' id='answer-label-667404' class=' answer'><span>Divide the documents by department and set permissions on each departmental folder<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-164639'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>Below is a screenshot from a deployed next-generation firewall. <br \/>\r<br>These configuration settings would be a defensive measure for which CIS Control? <br \/>\r<br><br><img decoding=\"async\" width=507 height=407 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2021\/01\/image008-29.jpg\" v:shapes=\"_x0000_i1028\"><br><\/div><input type='hidden' name='question_id[]' id='qID_16' value='164639' \/><input type='hidden' id='answerType164639' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164639[]' id='answer-id-667405' class='answer   answerof-164639 ' value='667405'   \/><label for='answer-id-667405' id='answer-label-667405' class=' answer'><span>Controlled Access Based on the Need to Know<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164639[]' id='answer-id-667406' class='answer   answerof-164639 ' value='667406'   \/><label for='answer-id-667406' id='answer-label-667406' class=' answer'><span>Limitation and Control of Network Ports, Protocols and Services<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164639[]' id='answer-id-667407' class='answer   answerof-164639 ' value='667407'   \/><label for='answer-id-667407' id='answer-label-667407' class=' answer'><span>Email and Web Browser Protections<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164639[]' id='answer-id-667408' class='answer   answerof-164639 ' value='667408'   \/><label for='answer-id-667408' id='answer-label-667408' class=' answer'><span>Secure Configuration for Network Devices, such as Firewalls, Routers and Switches.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-164640'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>Based on the data shown below. <br \/>\r<br><br><img decoding=\"async\" width=439 height=467 src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2021\/01\/image010-23.jpg\" v:shapes=\"_x0000_i1029\"><br><br \/>\r<br>Which wireless access point has the manufacturer default settings still in place?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='164640' \/><input type='hidden' id='answerType164640' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164640[]' id='answer-id-667409' class='answer   answerof-164640 ' value='667409'   \/><label for='answer-id-667409' id='answer-label-667409' class=' answer'><span>Starbucks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164640[]' id='answer-id-667410' class='answer   answerof-164640 ' value='667410'   \/><label for='answer-id-667410' id='answer-label-667410' class=' answer'><span>Linksys<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164640[]' id='answer-id-667411' class='answer   answerof-164640 ' value='667411'   \/><label for='answer-id-667411' id='answer-label-667411' class=' answer'><span>Hhonors<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164640[]' id='answer-id-667412' class='answer   answerof-164640 ' value='667412'   \/><label for='answer-id-667412' id='answer-label-667412' class=' answer'><span>Interwebz<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-164641'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Which of the following should be used to test antivirus software?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='164641' \/><input type='hidden' id='answerType164641' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164641[]' id='answer-id-667413' class='answer   answerof-164641 ' value='667413'   \/><label for='answer-id-667413' id='answer-label-667413' class=' answer'><span>FIPS 140-2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164641[]' id='answer-id-667414' class='answer   answerof-164641 ' value='667414'   \/><label for='answer-id-667414' id='answer-label-667414' class=' answer'><span>Code Red<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164641[]' id='answer-id-667415' class='answer   answerof-164641 ' value='667415'   \/><label for='answer-id-667415' id='answer-label-667415' class=' answer'><span>Heartbleed<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164641[]' id='answer-id-667416' class='answer   answerof-164641 ' value='667416'   \/><label for='answer-id-667416' id='answer-label-667416' class=' answer'><span>EICAR<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-164642'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>Which of the following best describes the CIS Controls?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='164642' \/><input type='hidden' id='answerType164642' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164642[]' id='answer-id-667417' class='answer   answerof-164642 ' value='667417'   \/><label for='answer-id-667417' id='answer-label-667417' class=' answer'><span>Technical, administrative, and policy controls based on research provided by the SANS Institute<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164642[]' id='answer-id-667418' class='answer   answerof-164642 ' value='667418'   \/><label for='answer-id-667418' id='answer-label-667418' class=' answer'><span>Technical controls designed to provide protection from the most damaging attacks based on current threat data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164642[]' id='answer-id-667419' class='answer   answerof-164642 ' value='667419'   \/><label for='answer-id-667419' id='answer-label-667419' class=' answer'><span>Technical controls designed to augment the NIST 800 series<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164642[]' id='answer-id-667420' class='answer   answerof-164642 ' value='667420'   \/><label for='answer-id-667420' id='answer-label-667420' class=' answer'><span>Technical, administrative, and policy controls based on current regulations and security best practices<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-164643'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>An attacker is able to successfully access a web application as root using \u2018 or 1 = 1 . as the password. The successful access indicates a failure of what process?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='164643' \/><input type='hidden' id='answerType164643' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164643[]' id='answer-id-667421' class='answer   answerof-164643 ' value='667421'   \/><label for='answer-id-667421' id='answer-label-667421' class=' answer'><span>Input Validation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164643[]' id='answer-id-667422' class='answer   answerof-164643 ' value='667422'   \/><label for='answer-id-667422' id='answer-label-667422' class=' answer'><span>Output Sanitization<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164643[]' id='answer-id-667423' class='answer   answerof-164643 ' value='667423'   \/><label for='answer-id-667423' id='answer-label-667423' class=' answer'><span>URL Encoding<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164643[]' id='answer-id-667424' class='answer   answerof-164643 ' value='667424'   \/><label for='answer-id-667424' id='answer-label-667424' class=' answer'><span>Account Management<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-164644'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>An organization has implemented a control for Controlled Use of Administrative Privileges. They are collecting audit data for each login, logout, and location for the root account of their MySQL server, but they are unable to attribute each of these logins to a specific user. <br \/>\r<br>What action can they take to rectify this?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='164644' \/><input type='hidden' id='answerType164644' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164644[]' id='answer-id-667425' class='answer   answerof-164644 ' value='667425'   \/><label for='answer-id-667425' id='answer-label-667425' class=' answer'><span>Force the root account to only be accessible from the system console.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164644[]' id='answer-id-667426' class='answer   answerof-164644 ' value='667426'   \/><label for='answer-id-667426' id='answer-label-667426' class=' answer'><span>Turn on SELinux and user process accounting for the MySQL server.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164644[]' id='answer-id-667427' class='answer   answerof-164644 ' value='667427'   \/><label for='answer-id-667427' id='answer-label-667427' class=' answer'><span>Force user accounts to use \u2018sudo\u2019 f or privileged use.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164644[]' id='answer-id-667428' class='answer   answerof-164644 ' value='667428'   \/><label for='answer-id-667428' id='answer-label-667428' class=' answer'><span>Blacklist client applications from being run in privileged mode.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-164645'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>Beta corporation is doing a core evaluation of its centralized logging capabilities. The security staff suspects that the central server has several log files over the past few weeks that have had their contents changed. <br \/>\r<br>Given this concern, and the need to keep archived logs for log correction applications, what is the most appropriate next steps?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='164645' \/><input type='hidden' id='answerType164645' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164645[]' id='answer-id-667429' class='answer   answerof-164645 ' value='667429'   \/><label for='answer-id-667429' id='answer-label-667429' class=' answer'><span>Keep the files in the log archives synchronized with another location.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164645[]' id='answer-id-667430' class='answer   answerof-164645 ' value='667430'   \/><label for='answer-id-667430' id='answer-label-667430' class=' answer'><span>Store the files read-only and keep hashes of the logs separately.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164645[]' id='answer-id-667431' class='answer   answerof-164645 ' value='667431'   \/><label for='answer-id-667431' id='answer-label-667431' class=' answer'><span>Install a tier one timeserver on the network to keep log devices synchronized.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164645[]' id='answer-id-667432' class='answer   answerof-164645 ' value='667432'   \/><label for='answer-id-667432' id='answer-label-667432' class=' answer'><span>Encrypt the log files with an asymmetric key and remove the cleartext version.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-164646'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>Which of the following is a benefit of stress-testing a network?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='164646' \/><input type='hidden' id='answerType164646' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164646[]' id='answer-id-667433' class='answer   answerof-164646 ' value='667433'   \/><label for='answer-id-667433' id='answer-label-667433' class=' answer'><span>To determine device behavior in a DoS condition.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164646[]' id='answer-id-667434' class='answer   answerof-164646 ' value='667434'   \/><label for='answer-id-667434' id='answer-label-667434' class=' answer'><span>To determine bandwidth needs for the network.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164646[]' id='answer-id-667435' class='answer   answerof-164646 ' value='667435'   \/><label for='answer-id-667435' id='answer-label-667435' class=' answer'><span>To determine the connectivity of the network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164646[]' id='answer-id-667436' class='answer   answerof-164646 ' value='667436'   \/><label for='answer-id-667436' id='answer-label-667436' class=' answer'><span>To determine the security configurations of the network<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-164647'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>Which of the following is a reliable way to test backed up data?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='164647' \/><input type='hidden' id='answerType164647' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164647[]' id='answer-id-667437' class='answer   answerof-164647 ' value='667437'   \/><label for='answer-id-667437' id='answer-label-667437' class=' answer'><span>Verify the file size of the backup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164647[]' id='answer-id-667438' class='answer   answerof-164647 ' value='667438'   \/><label for='answer-id-667438' id='answer-label-667438' class=' answer'><span>Confirm the backup service is running at the proper time<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164647[]' id='answer-id-667439' class='answer   answerof-164647 ' value='667439'   \/><label for='answer-id-667439' id='answer-label-667439' class=' answer'><span>Compare data hashes of backed up data to original systems<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164647[]' id='answer-id-667440' class='answer   answerof-164647 ' value='667440'   \/><label for='answer-id-667440' id='answer-label-667440' class=' answer'><span>Restore the data to a system<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-164648'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>John a network administrator at Northeast High School. Faculty have been complaining that although they can detect and authenticate to the faculty wireless network, they are unable to connect. While troubleshooting, John discovers that the wireless network server is out of DHCP addresses due to a large number of unauthorized student devices connecting to the network. <br \/>\r<br>Which course of action would be an effective temporary stopgap to secure the network until a permanent solution can be found?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='164648' \/><input type='hidden' id='answerType164648' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164648[]' id='answer-id-667441' class='answer   answerof-164648 ' value='667441'   \/><label for='answer-id-667441' id='answer-label-667441' class=' answer'><span>Limit access to allowed MAC addresses<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164648[]' id='answer-id-667442' class='answer   answerof-164648 ' value='667442'   \/><label for='answer-id-667442' id='answer-label-667442' class=' answer'><span>Increase the size of the DHCP pool<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164648[]' id='answer-id-667443' class='answer   answerof-164648 ' value='667443'   \/><label for='answer-id-667443' id='answer-label-667443' class=' answer'><span>Change the password immediately<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164648[]' id='answer-id-667444' class='answer   answerof-164648 ' value='667444'   \/><label for='answer-id-667444' id='answer-label-667444' class=' answer'><span>Shorten the DHCP lease time<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-164649'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>An organization is implementing a control for the Limitation and Control of Network Ports, Protocols, and Services CIS Control. <br \/>\r<br>Which action should they take when they discover that an application running on a web server is no longer needed?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='164649' \/><input type='hidden' id='answerType164649' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164649[]' id='answer-id-667445' class='answer   answerof-164649 ' value='667445'   \/><label for='answer-id-667445' id='answer-label-667445' class=' answer'><span>Uninstall the application providing the service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164649[]' id='answer-id-667446' class='answer   answerof-164649 ' value='667446'   \/><label for='answer-id-667446' id='answer-label-667446' class=' answer'><span>Turn the service off in the host configuration files<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164649[]' id='answer-id-667447' class='answer   answerof-164649 ' value='667447'   \/><label for='answer-id-667447' id='answer-label-667447' class=' answer'><span>Block the protocol for the unneeded service at the firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164649[]' id='answer-id-667448' class='answer   answerof-164649 ' value='667448'   \/><label for='answer-id-667448' id='answer-label-667448' class=' answer'><span>Create an access list on the router to filter traffic to the host<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-164650'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>What is the first step suggested before implementing any single CIS Control?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='164650' \/><input type='hidden' id='answerType164650' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164650[]' id='answer-id-667449' class='answer   answerof-164650 ' value='667449'   \/><label for='answer-id-667449' id='answer-label-667449' class=' answer'><span>Develop an effectiveness test<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164650[]' id='answer-id-667450' class='answer   answerof-164650 ' value='667450'   \/><label for='answer-id-667450' id='answer-label-667450' class=' answer'><span>Perform a gap analysis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164650[]' id='answer-id-667451' class='answer   answerof-164650 ' value='667451'   \/><label for='answer-id-667451' id='answer-label-667451' class=' answer'><span>Perform a vulnerability scan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164650[]' id='answer-id-667452' class='answer   answerof-164650 ' value='667452'   \/><label for='answer-id-667452' id='answer-label-667452' class=' answer'><span>Develop a roll-out schedule<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-164651'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>Which of the following assigns a number indicating the severity of a discovered software vulnerability?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='164651' \/><input type='hidden' id='answerType164651' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164651[]' id='answer-id-667453' class='answer   answerof-164651 ' value='667453'   \/><label for='answer-id-667453' id='answer-label-667453' class=' answer'><span>CPE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164651[]' id='answer-id-667454' class='answer   answerof-164651 ' value='667454'   \/><label for='answer-id-667454' id='answer-label-667454' class=' answer'><span>CVE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164651[]' id='answer-id-667455' class='answer   answerof-164651 ' value='667455'   \/><label for='answer-id-667455' id='answer-label-667455' class=' answer'><span>CCE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164651[]' id='answer-id-667456' class='answer   answerof-164651 ' value='667456'   \/><label for='answer-id-667456' id='answer-label-667456' class=' answer'><span>CVSS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-164652'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>What could a security team use the command line tool Nmap for when implementing the Inventory and Control of Hardware Assets Control?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='164652' \/><input type='hidden' id='answerType164652' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164652[]' id='answer-id-667457' class='answer   answerof-164652 ' value='667457'   \/><label for='answer-id-667457' id='answer-label-667457' class=' answer'><span>Control which devices can connect to the network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164652[]' id='answer-id-667458' class='answer   answerof-164652 ' value='667458'   \/><label for='answer-id-667458' id='answer-label-667458' class=' answer'><span>Passively identify new devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164652[]' id='answer-id-667459' class='answer   answerof-164652 ' value='667459'   \/><label for='answer-id-667459' id='answer-label-667459' class=' answer'><span>Inventory offline databases<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164652[]' id='answer-id-667460' class='answer   answerof-164652 ' value='667460'   \/><label for='answer-id-667460' id='answer-label-667460' class=' answer'><span>Actively identify new servers<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-164653'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>An organization wants to test its procedure for data recovery. <br \/>\r<br>Which of the following will be most effective?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='164653' \/><input type='hidden' id='answerType164653' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164653[]' id='answer-id-667461' class='answer   answerof-164653 ' value='667461'   \/><label for='answer-id-667461' id='answer-label-667461' class=' answer'><span>Verifying a file can be recovered from backup media<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164653[]' id='answer-id-667462' class='answer   answerof-164653 ' value='667462'   \/><label for='answer-id-667462' id='answer-label-667462' class=' answer'><span>Verifying that backup process is running when it should<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164653[]' id='answer-id-667463' class='answer   answerof-164653 ' value='667463'   \/><label for='answer-id-667463' id='answer-label-667463' class=' answer'><span>Verifying that network backups can\u2019t be read in transit<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-164653[]' id='answer-id-667464' class='answer   answerof-164653 ' value='667464'   \/><label for='answer-id-667464' id='answer-label-667464' class=' answer'><span>Verifying there are no errors in the backup server logs<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-31'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons5095\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"5095\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-14 15:27:56\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1778772476\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"164624:667344,667345,667346,667347 | 164625:667348,667349,667350,667351 | 164626:667352,667353,667354,667355 | 164627:667356,667357,667358,667359 | 164628:667360,667361,667362,667363 | 164629:667364,667365,667366,667367 | 164630:667368,667369,667370,667371 | 164631:667372,667373,667374,667375,667376 | 164632:667377,667378,667379,667380 | 164633:667381,667382,667383,667384 | 164634:667385,667386,667387,667388 | 164635:667389,667390,667391,667392 | 164636:667393,667394,667395,667396 | 164637:667397,667398,667399,667400 | 164638:667401,667402,667403,667404 | 164639:667405,667406,667407,667408 | 164640:667409,667410,667411,667412 | 164641:667413,667414,667415,667416 | 164642:667417,667418,667419,667420 | 164643:667421,667422,667423,667424 | 164644:667425,667426,667427,667428 | 164645:667429,667430,667431,667432 | 164646:667433,667434,667435,667436 | 164647:667437,667438,667439,667440 | 164648:667441,667442,667443,667444 | 164649:667445,667446,667447,667448 | 164650:667449,667450,667451,667452 | 164651:667453,667454,667455,667456 | 164652:667457,667458,667459,667460 | 164653:667461,667462,667463,667464\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"164624,164625,164626,164627,164628,164629,164630,164631,164632,164633,164634,164635,164636,164637,164638,164639,164640,164641,164642,164643,164644,164645,164646,164647,164648,164649,164650,164651,164652,164653\";\nWatuPROSettings[5095] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 5095;\t    \nWatuPRO.post_id = 18183;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.45580100 1778772476\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(5095);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11190,415],"tags":[11184,11185,11186,11187,11188,11189],"class_list":["post-18183","post","type-post","status-publish","format-standard","hentry","category-critical-controls","category-giac","tag-gccc","tag-gccc-dumps","tag-gccc-dumps-questions","tag-gccc-exam-dumps","tag-gccc-exam-questions","tag-gccc-free-dumps"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/18183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=18183"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/18183\/revisions"}],"predecessor-version":[{"id":18185,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/18183\/revisions\/18185"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=18183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=18183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=18183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}