Janice is auditing the perimeter of the network at Sugar Water InC. According to documentation, external SMTP traffic is only allowed to and from 10.10.10.25. Which of the following actions would demonstrate the rules are configured incorrectly?
An organization is implementing a control within the Application Software Security CIS Control. How can they best protect against injection attacks against their custom web application and database applications?
Acme Corporation is doing a core evaluation of its centralized logging capabilities. Which of the following scenarios indicates a failure in more than one CIS Control?
John is implementing a commercial backup solution for his organization. Which of the following steps should be on the configuration checklist?
An auditor is focusing on potential vulnerabilities. Which of the following should cause an alert?
An attacker is able to successfully access a web application as root using ‘ or 1 = 1 . as the password. The successful access
indicates a failure of what process?