GIAC Certified ISO-2700 Specialist Practice Test
GIAC Certified Firewall Analyst
GIAC Certified Project Manager Certification Practice Test
GIAC Information Security Fundamentals
GIAC Information Security Professional
GIAC GIAC Secure Software Programmer - C#.NET
GIAC Secure Software Programmer – Java
GIAC Systems and Network Auditor
GCIA – GIAC Certified Intrusion Analyst Practice Test
What is the first step suggested before implementing any single CIS Control?
Develop an effectiveness test
Perform a gap analysis
Perform a vulnerability scan
Develop a roll-out schedule
According to attack lifecycle models, what is the attacker’s first step in compromising an organization?
Privilege Escalation
Exploitation
Initial Compromise
Reconnaissance
What is a recommended defense for the CIS Control for Application Software Security?
Keep debugging code in production web applications for quick troubleshooting
Limit access to the web application production environment to just the developers
Run a dedicated vulnerability scanner against backend databases
Display system error messages for only non-kernel related events