CIS 462 Course Great Wisdom / tutorialrank.com CIS 462 Course Great Wisdom / tutorialrank.com | Page 16

• Question 10 Which organization maintains the Common Vulnerabilities and Exposures ( CVE ) list ?
• Question 11 Best practices for IT security policy compliance monitoring includes ___________.
• Question 12 Three major components of the ITIL life cycle are service transition , service operation , and service _________.
• Question 13 You want to identify active hosts on a network , detect open ports , and determine the operating system in use on servers . Which is the best tool to use ?
• Question 14 Nessus ® is a type of _______________.
• Question 15 Your company wants to minimize the risk of its employees sharing confidential company information via e-mail . What is the best tool to use to minimize this risk ?