Sans Top 20 Flashcards

Learn sans top 20

1
Q

CSC1

A

CSC 1: Inventory of Authorized and Unauthorized Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CSC2

A

CSC 2: Inventory of Authorized and Unauthorized Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CSC3

A

CSC 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CSC4

A

CSC 4: Continuous Vulnerability Assessment and Remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CSC5

A

CSC 5: Controlled Use of Administrative Privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CSC6

A

CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CSC7

A

CSC 7: Email and Web Browser Protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CSC8

A

CSC 8: Malware Defenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CSC9

A

CSC 9: Limitation and Control of Network Ports, Protocols, and Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CSC10

A

CSC 10: Data Recovery Capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CSC11

A

CSC 11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CSC12

A

CSC 12: Boundary Defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CSC13

A

CSC 13: Data Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CSC14

A

CSC 14: Controlled Access Based on the Need to Know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CSC15

A

CSC 15: Wireless Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CSC16

A

CSC 16: Account Monitoring and Control

17
Q

CSC17

A

CSC 17: Security Skills Assessment and Appropriate Training to Fill Gaps

18
Q

CSC18

A

CSC 18: Application Software Security

19
Q

CSC19

A

CSC 19: Incident Response and Management

20
Q

CSC20

A

CSC 20: Penetration Tests and Red Team Exercises