GIAC GCCC Question Answer
Given the audit finding below, which CIS Control was being measured?
Controlled Access Based on the Need to Know
Controlled Use of Administrative Privilege
Limitation and Control of Network Ports, Protocols and Services
Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
Inventory and Control of Hardware Assets
TESTED 06 Jul 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved