Question 79

- (Exam Topic 1)
According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes soon after (or at the same time as) the Create phase?

Correct Answer:A

Question 80

- (Exam Topic 2)
The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is composed by a member-driven OWASP committee of application development experts and published approximately every 24 months. The 2013 OWASP Top Ten list includes “using components with known vulnerabilities.”
Why would an organization ever use components with known vulnerabilities to create software? Response:

Correct Answer:B

Question 81

- (Exam Topic 2)
You are the security manager for a company that is considering cloud migration to an IaaS environment. You are assisting your company’s IT architects in constructing the environment. Which of the following options do you recommend?
Response:

Correct Answer:B

Question 82

- (Exam Topic 3)
Digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM) often protect unauthorized distribution of what type of intellectual property?
Response:

Correct Answer:D

Question 83

- (Exam Topic 1)
Which of the following is not typically included as a basic phase of the software development life cycle?

Correct Answer:C

Question 84

- (Exam Topic 1)
Which of the following are considered to be the building blocks of cloud computing? Response:

Correct Answer:C

START CCSP EXAM