Which of the following testing methodologies TYPICALLY involves code analysis in an offline environment without ever actually executing the code?
A system administrator has created the following "array" as an access control for an organisation.
Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files.
What type of access-control has just been created?
Which of the following statutory requirements are likely to be of relevance to all organisations no matter which sector nor geographical location they operate in?
Which standard deals with the implementation of business continuity?
Which of the following subjects is UNLIKELY to form part of a cloud service provision laaS contract?
Which of the following is NOT a valid statement to include in an organisation's security policy?
When securing a wireless network, which of the following is NOT best practice?
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
What type of attack could directly affect the confidentiality of an unencrypted VoIP network?
Which of the following types of organisation could be considered the MOST at risk from the theft of electronic based credit card data?