A chief information security officer (CISO) is providing a presentation to a group of network engineers. In the presentation, the CISO presents information regarding exploit kits. Which of the following might the CISO present?
A. Exploit kits are tools capable of taking advantage of multiple CVEs
B. Exploit kits are vulnerability scanners used by penetration testers
C. Exploit kits are WIFI scanning tools that can find new honeypots
D. Exploit kits are a new type of malware that allow attackers to control their computers
Answer: A
During a company-wide initiative to harden network security, it is discovered that end users who have laptops cannot be removed from the local administrator group.
Which of the following could be used to help mitigate the risk of these machines becoming compromised?
A. Security log auditing
B. Firewalls
C. HIPS
D. IDS
Answer: B
No comments:
Post a Comment
Note: only a member of this blog may post a comment.