What type of credential is commonly used to restrict access to an API?
Blog
Mike installs a firewall in front of a previously open netwo…
Mike installs a firewall in front of a previously open network to prevent the systems behind the firewall from being targeted by external systems. What did Mike do?
Jessica is reading reports from vulnerability scans run by d…
Jessica is reading reports from vulnerability scans run by different parts of her organization using different products. She is responsible for assigning remediation resources and is having difficulty prioritizing issues from different sources. What SCAP component can help Jessica with this task?
Megan has recently discovered that the Linux server she is r…
Megan has recently discovered that the Linux server she is responsible for maintaining is affected by a zero-day exploit for a vulnerability in the web application software that is needed by her organization. Which of the following compensating controls should she implement to best protect the server?
Which one of the CVSS metrics would contain information abou…
Which one of the CVSS metrics would contain information about the type of account access that an attacker must have to execute an attack?
Kevin recently identified a new security vulnerability and c…
Kevin recently identified a new security vulnerability and computed its CVSS base score as 6.5. Which risk category would this vulnerability fall into?
Chris is in charge of his organization’s Windows security st…
Chris is in charge of his organization’s Windows security standard, including their Windows 7 security standard, and has recently decommissioned the organization’s last Windows 7 system. What is the next step in his security standard’s life cycle?
Which one of the following protocols should never be used on…
Which one of the following protocols should never be used on a public network?
Betty is selecting a transport encryption protocol for use i…
Betty is selecting a transport encryption protocol for use in a new public website she is creating. Which protocol would be the best choice?
Which one of the following metrics is not included in the ca…
Which one of the following metrics is not included in the calculation of the CVSS exploitability score?