- (Exam Topic 2)
What are the four cloud deployment models? Response:
Correct Answer:D
- (Exam Topic 2)
All of the following methods can be used to attenuate the harm caused by escalation of privilege except: Response:
Correct Answer:C
- (Exam Topic 2)
Which security certification serves as a general framework that can be applied to any type of system or application?
Response:
Correct Answer:A
- (Exam Topic 2)
Which of the following BCDR testing methodologies is least intrusive? Response:
Correct Answer:C
- (Exam Topic 1)
What sort of legal enforcement may the Payment Card Industry (PCI) Security Standards Council not bring to bear against organizations that fail to comply with the Payment Card Industry Data Security Standard (PCI DSS)?
Response:
Correct Answer:B