Which attribute of data poses the biggest challenge for data discovery?
What does static application security testing (SAST) offer as a tool to the testers?
At which stage of the BCDR plan creation phase should security be included in discussions?
Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?
Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?
Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?
Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?
A crucial decision any company must make is in regard to where it hosts the data systems it depends on. A debate exists as to whether it's best to lease space in a data center or build your own data center--and now with cloud computing, whether to purchase resources within a cloud.
What is the biggest advantage to leasing space in a data center versus procuring cloud services?
In the wake of many scandals with major corporations involving fraud and the deception of investors and regulators, which of the following laws was passed to govern accounting and financial records and disclosures?
In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?
Which of the following threat types involves the sending of commands or arbitrary data through input fields in an application in an attempt to get that code executed as part of normal processing?
From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?
Most APIs will support a variety of different data formats or structures.
However, the SOAP API will only support which one of the following data formats?
Within a federated identity system, which entity accepts tokens from the identity provider?
For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?