Which of the following concepts are included on the three sides of the "security triangle"?
Which of the following concepts are included on the three sides of the “security triangle”? (Select THREE).
which of the following data security concerns?
Elastic cloud computing environments often reuse the same physical hardware for multiple customers
over time as virtual machines are instantiated and deleted. This has important implications for which of
the following data security concerns?
Which of the following would be a possible solution to look into to ensure their application remains secure an
The system administrator notices that their application is no longer able to keep up with the large
amounts of traffic their server is receiving daily. Several packets are dropped and sometimes the server istaken offline. Which of the following would be a possible solution to look into to ensure their application
remains secure and available?
Which of the following poses the greatest risk with this integration?
Users can authenticate to a company’s web applications using their credentials from a popular social
media site. Which of the following poses the greatest risk with this integration?
Which of the following is the GREATEST security risk of two or more companies working together under a Memoran
Which of the following is the GREATEST security risk of two or more companies working together under a
Memorandum of Understanding?
Which of the following describes the purpose of an MOU?
Which of the following describes the purpose of an MOU?
Which of the following types of interoperability agreement is this?
A company has decided to move large data sets to a cloud provider in order to limit the costs of new
infrastructure. Some of the data is sensitive and the Chief Information Officer wants to make sure both
parties have a clear understanding of the controls needed to protect the data.
Which of the following types of interoperability agreement is this?
Which of the following is the primary security concern when deploying a mobile device on a network?
Which of the following is the primary security concern when deploying a mobile device on a network?
Which of the following should the security administrator do in regards to the application?
A security administrator plans on replacing a critical business application in five years. Recently, there was
a security flaw discovered in the application that will cause the IT department to manually re-enable user
accounts each month at a cost of $2,000. Patching the application today would cost $140,000 and take
two months to implement. Which of the following should the security administrator do in regards to the
application?
Which of the following MUST be considered prior to sending data to a third party?
Acme Corp has selectively outsourced proprietary business processes to ABC Services. Due to some
technical issues, ABC services wants to send some of Acme Corp’s debug data to a third party vendor for
problem resolution. Which of the following MUST be considered prior to sending data to a third party?