An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?
An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?
Which logical design model includes the foundations of a secure computing system, such as computing, networking, and storage?
The designers of a proposed data center are evaluating the requirements to use virtualization for the services it provides. Which type of design consideration is being addressed?
An engineer has been given the task of ensuring all of the keys used to encrypt archival data are securely stored according to industry standards. Which location is a secure option for the engineer to store encryption keys for decrypting data?
Which device identifies and stops attack-based commands from executing on a structured query language (SQL) server?
Which type of cloud security vulnerability is static application security testing (SAST) likely to find?
Which option should a cloud architect recommend to an organization looking to simplify development and management of applications?
As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?
Which term describes data elements that, when combined with other information, are used to single out an individual?
|
PDF + Testing Engine
|
|---|
|
$49.5 |
|
Testing Engine
|
|---|
|
$37.5 |
|
PDF (Q&A)
|
|---|
|
$31.5 |
WGU Free Exams |
|---|
|