Which device identifies and stops attack-based commands from executing on a structured query language (SQL) server?
Which item should be used by a consumer to determine whether a cloud service provider is in regulatory or legal compliance?
Which security issue can be found only through dynamic application security testing (DAST)?
Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?
An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?
Which type of service allows an organization to maximize control of its information?
A business wants to avoid buying physical hardware and wants to host a PCI DSS–compliant application using the infrastructure as a service (IaaS) model of a public cloud provider. Which method can be used to provide network monitoring security controls in this environment?
Which description characterizes the application programming interface (API) format known as Simple Object Access Protocol (SOAP)?
Why must the software agent management plane of the workload security control support auto-scaling and elasticity?
Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?