Topic 1: Exam Pool A
During which stage of the SDLC process should security be consulted and begin its
initial involvement?
A.
Testing
B.
Design
C.
Development
D.
Requirement gathering
Requirement gathering
Why are PaaS environments at a higher likelihood of suffering backdoor
vulnerabilities?
A.
They rely on virtualization.
B.
They are often used for software development.
C.
They have multitenancy.
D.
They are scalable.
They are often used for software development.
You are in charge of creating the BCDR plan and procedures for your organization. Your
organization has its production environment hosted by a cloud provider, and you have
appropriate protections in place.
Which of the following is a significant consideration for your BCDR backup?
Response:
A.
Enough personnel at the BCDR recovery site to ensure proper operations
B.
Good cryptographic key management
C.
Access to the servers where the BCDR backup is stored
D.
Forensic analysis capabilities
Good cryptographic key management
DLP can be combined with what other security technology to enhance data controls?
Response:
A.
DRM
B.
SIEM
C.
Kerberos
D.
Hypervisors
DRM
Which of the following is considered an administrative control?
A.
Access control process
B.
Keystroke logging
C.
Door locks
D.
Biometric authentication
Access control process
Page 21 out of 103 Pages |
Previous |