Which of the following are risks associated with vendor lock-in? (Choose two.)
A.
The client can seamlessly move data.
B.
The vendor can change product offerings.
C.
The client receives a sufficient level of service.
D.
The client experiences decreased quality of service.
E.
The client can leverage a multicloud approach.
F.
The client experiences increased interoperability.
The vendor can change product offerings.
The client experiences decreased quality of service.
Reference: https://www.cloudflare.com/learning/cloud/what-is-vendor-lockin/#:~:
text=Vendor-lock%2Din-can-become,may-involve-reformatting%2
0the-data
A security engineer was auditing an organization’s current software development practice
and discovered that multiple open-source libraries were Integrated into the organization’s
software. The organization currently performs SAST and DAST on the software it develops.
Which of the following should the organization incorporate into the SDLC to ensure the
security of the open-source libraries?
A.
Perform additional SAST/DAST on the open-source libraries.
B.
Implement the SDLC security guidelines.
C.
Track the library versions and monitor the CVE website for related vulnerabilities.
D.
Perform unit testing of the open-source libraries.
Implement the SDLC security guidelines.
Reference: https://www.whitesourcesoftware.com/resources/blog/application-security-bestpractices/
A security engineer has been asked to close all non-secure connections from the corporate network. The engineer is attempting to understand why the corporate UTM will not allow users to download email via IMAPS. The engineer formulates a theory and begins testing by creating the firewall ID 58, and users are able to download emails correctly by using IMAP instead. The network comprises three VLANs:
Which of the following should the security engineer do to ensure IMAPS functions properly
on the corporate user network?
A.
Contact the email service provider and ask if the company IP is blocked.
B.
Confirm the email server certificate is installed on the corporate computers.
C.
Make sure the UTM certificate is imported on the corporate computers.
D.
Create an IMAPS firewall rule to ensure email is allowed.
Make sure the UTM certificate is imported on the corporate computers.
Which of the following is the MOST important security objective when applying
cryptography to control messages that tell an ICS how much electrical power to output?
A.
Importing the availability of messages
B.
Ensuring non-repudiation of messages
C.
Enforcing protocol conformance for messages
D.
Assuring the integrity of messages
Assuring the integrity of messages
Company A is establishing a contractual with Company B. The terms of the agreement are
formalized in a document covering the payment terms, limitation of liability, and intellectual
property rights. Which of the following documents will MOST likely contain these elements
A.
Company A-B SLA v2.docx
B.
Company A OLA v1b.docx
C.
Company A MSA v3.docx
D.
Company A MOU v1.docx
E.
Company A-B NDA v03.docx
Company A-B SLA v2.docx
Page 7 out of 40 Pages |
Previous |