- (Exam Topic 1)
According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes soon after (or at the same time as) the Create phase?
Correct Answer:A
- (Exam Topic 2)
The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is composed by a member-driven OWASP committee of application development experts and published approximately every 24 months. The 2013 OWASP Top Ten list includes “using components with known vulnerabilities.”
Why would an organization ever use components with known vulnerabilities to create software? Response:
Correct Answer:B
- (Exam Topic 2)
You are the security manager for a company that is considering cloud migration to an IaaS environment. You are assisting your company’s IT architects in constructing the environment. Which of the following options do you recommend?
Response:
Correct Answer:B
- (Exam Topic 3)
Digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM) often protect unauthorized distribution of what type of intellectual property?
Response:
Correct Answer:D
- (Exam Topic 1)
Which of the following is not typically included as a basic phase of the software development life cycle?
Correct Answer:C
- (Exam Topic 1)
Which of the following are considered to be the building blocks of cloud computing? Response:
Correct Answer:C