Which type of testing uses the same strategies and toolsets that hackers would use?
Which European Union directive pertains to personal data privacy and an individual's control over their personal data?
What type of masking strategy involves replacing data on a system while it passes between the data and application layers?
What concept does the "T" represent in the STRIDE threat model?
What type of data does data rights management (DRM) protect?
Who would be responsible for implementing IPsec to secure communications for an application?
Which of the following is NOT a key area for performance monitoring as far as an SLA is concerned?
Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?
Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?
Which of the following can be useful for protecting cloud customers from a denial-of-service (DoS) attack against another customer hosted in the same cloud?
What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?
Which OSI layer does IPsec operate at?
Which of the cloud cross-cutting aspects relates to the ability to reuse or move components of an application or service?
What concept does the "R" represent with the DREAD model?
What must SOAP rely on for security?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
ISC Free Exams |
---|
![]() |