CIS 462 Course Great Wisdom / tutorialrank.com CIS 462 Course Great Wisdom / tutorialrank.com | Page 16

• Question 10 Which organization maintains the Common Vulnerabilities and Exposures( CVE) list?
• Question 11 Best practices for IT security policy compliance monitoring includes ___________.
• Question 12 Three major components of the ITIL life cycle are service transition, service operation, and service _________.
• Question 13 You want to identify active hosts on a network, detect open ports, and determine the operating system in use on servers. Which is the best tool to use?
• Question 14 Nessus ® is a type of _______________.
• Question 15 Your company wants to minimize the risk of its employees sharing confidential company information via e-mail. What is the best tool to use to minimize this risk?