- (Exam Topic 14)
Which would result in the GREATEST import following a breach to a cloud environment?
Correct Answer:
C
- (Exam Topic 9)
Which one of the following is a threat related to the use of web-based client side input validation?
Correct Answer:
A
- (Exam Topic 15)
The Chief Information Security Officer (CISO) of an organization has requested that a Service Organization Control (SOC) report be created to outline the security and availability of a
particular system over a 12-month period. Which type of SOC report should be utilized?
Correct Answer:
C
- (Exam Topic 15)
At which phase of the software assurance life cycle should risks associated with software acquisition strategies be identified?
Correct Answer:
C
- (Exam Topic 15)
The application owner of a system that handles confidential data leaves an organization. It is anticipated that a replacement will be hired in approximately six months. During that time, which of the following should the organization do?
Correct Answer:
B