- (Exam Topic 2)
What could be the result of failure of the cloud provider to secure the hypervisor in such a way that one user on a virtual machine can see the resource calls of another user’s virtual machine?
Response:
Correct Answer:B
- (Exam Topic 1)
Which of the following is a file server that provides data access to multiple, heterogeneous machines/users on the network?
Response:
Correct Answer:B
- (Exam Topic 2)
Which of the following would NOT be included as input into the requirements gathering for an application or system?
Response:
Correct Answer:D
- (Exam Topic 1)
The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is composed by a member-driven OWASP committee of application development experts and published approximately every 24 months. The 2013 OWASP Top Ten list includes “sensitive data exposure.”
Which of these is a technique to reduce the potential for a sensitive data exposure? Response:
Correct Answer:A
- (Exam Topic 2)
Single sign-on systems work by authenticating users from a centralized location or using a centralized method, and then allowing applications that trust the system to grant those users access. What would be passed between the authentication system and the applications to grant a user access?
Response:
Correct Answer:D