New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?

Options:

A.

Software development


B.

Procurement


C.

Quality assurance


D.

Marketing


Expert Solution
Questions # 22:

Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?

Options:

A.

On-path


B.

Injection


C.

Credential


D.

Denial-of-service


Expert Solution
Questions # 23:

Which steps should an organization take to avoid risk when dealing with software licensing?

Options:

A.

It should ensure it has the correct type of license.


B.

It should ensure it has the correct location to store licenses.


C.

It should ensure it only uses closed-source licenses.


D.

It should ensure it only uses open-source licenses.


Expert Solution
Questions # 24:

An engineer has been given the task of ensuring all of the keys used to encrypt archival data are securely stored according to industry standards. Which location is a secure option for the engineer to store encryption keys for decrypting data?

Options:

A.

A repository that is made private


B.

An escrow that is kept separate from the data it is tied to


C.

An escrow that is kept local to the data it is tied to


D.

A repository that is made public


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions