An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?
Which security control is a countermeasure against vendor lock-in and lock-out?
Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?
Which cloud model provides retention of governance controls to a large company with legacy systems?
Which risk relates to the removal of a person’s information within the public cloud by legal authorities?
As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?
What is a benefit of federated identity and access management (IAM)?
What is the process of identifying and procuring stored data as evidence for legal purposes?
An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?
After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?
|
PDF + Testing Engine
|
|---|
|
$49.5 |
|
Testing Engine
|
|---|
|
$37.5 |
|
PDF (Q&A)
|
|---|
|
$31.5 |
WGU Free Exams |
|---|
|