1. During the design of a new application, the programmers need to determine the performance and security impact of the new application on the enterprise. Who should collaborate with the programmers to determine this information?
A) executive management B) network administrator C) database administrator D) physical security manager
2. Management expresses concerns about using multitenant public cloud solutions to store organizational data. You explain thattenant data in a multitenant solution is quarantined from other tenants - data, using tenant IDs in the data labels. What is the term for this process?
A) data isolation B) data purging C) data aggregation D) data remnants
3. You would like to prevent users from using a password again when it is time to change their passwords. What policy do youneed to implement?
A) authentication period B) password life C) password history D) password complexity
4. A forensic investigator is collecting evidence of a recent attack at your organization. You are helping him preserve the evidence for use in the lawsuit that your company plans to bring against the attackers. Which of the following is not one of the five rules of evidence?
A) Be accurate. B) Be volatile. C) Be convincing. D) Be admissible.
5. Which of the following is an example of a crypto processor?
A) TPM chip B) Microsoft CryptoAPI (CAPI) C) token D) CSP
1. Right Answer: B Explanation: The programmers should collaborate with the network administrator to determine the performance and security impact of the new application on the enterprise.
2. Right Answer: A Explanation: Data isolation ensures that tenant data in a multitenant solution is isolated from other tenants data via tenant IDs in the data labels.
3. Right Answer: C Explanation: Password history controls the amount of time until a password can be reused. Password policies usually remember a certain number of previously used passwords.
4. Right Answer: B Explanation: The five rules of evidence are as follows: Be authentic. Be accurate. Be complete. Be convincing. Be admissible.
5. Right Answer: A Explanation: An example is the Trusted Platform Module (TPM) on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication. Another example is the processors contained in hardware security modules.
Leave a comment