Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which attribute of data poses the biggest challenge for data discovery?

A.

Labels

B.

Quality

C.

Volume

D.

Format

What does static application security testing (SAST) offer as a tool to the testers?

A.

Production system scanning

B.

Injection attempts

C.

Source code access

D.

Live testing

At which stage of the BCDR plan creation phase should security be included in discussions?

A.

Define scope

B.

Analyze

C.

Assess risk

D.

Gather requirements

Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?

A.

Structured

B.

Unstructured

C.

Volume

D.

Object

Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?

A.

Unstructured

B.

Object

C.

Volume

D.

Structured

Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?

A.

Cross-site request forgery

B.

Missing function-level access control

C.

Injection

D.

Cross-site scripting

Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?

A.

Injection

B.

Missing function-level access control

C.

Cross-site scripting

D.

Cross-site request forgery

A crucial decision any company must make is in regard to where it hosts the data systems it depends on. A debate exists as to whether it's best to lease space in a data center or build your own data center--and now with cloud computing, whether to purchase resources within a cloud.

What is the biggest advantage to leasing space in a data center versus procuring cloud services?

A.

Regulations

B.

Control

C.

Security

D.

Costs

In the wake of many scandals with major corporations involving fraud and the deception of investors and regulators, which of the following laws was passed to govern accounting and financial records and disclosures?

A.

GLBA

B.

Safe Harbor

C.

HIPAA

D.

SOX

In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?

A.

Demagnetizing

B.

Shredding

C.

Degaussing

D.

Cryptographic erasure

Which of the following threat types involves the sending of commands or arbitrary data through input fields in an application in an attempt to get that code executed as part of normal processing?

A.

Cross-site scripting

B.

Missing function-level access control

C.

Injection

D.

Cross-site forgery

From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?

A.

Hypervisor

B.

Management plane

C.

Object storage

D.

Encryption

Most APIs will support a variety of different data formats or structures.

However, the SOAP API will only support which one of the following data formats?

A.

XML

B.

XSLT

C.

JSON

D.

SAML

Within a federated identity system, which entity accepts tokens from the identity provider?

A.

Assertion manager

B.

Servicing party

C.

Proxy party

D.

Relying party

For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?

A.

Half

B.

Full

C.

Minimal

D.

Depends on the contract