In addition to battery backup, a UPS can offer which capability? A. Breach alert B. Confidentiality C. Communication redundancy D. Line conditioning
Correct Answer: D
Explanation:
Explanation: A UPS can provide line conditioning, adjusting power so that it is optimized for the devices it serves and smoothing any power fluctuations; it does not offer any of the other listed functions.
A localized incident or disaster can be addressed in a cost-effective manner by using which of the following? A. UPS B. Generators C. Joint operating agreements D. Strict adherence to applicable regulations
Correct Answer: C
Explanation:
Explanation: Joint operating agreements can provide nearby relocation sites so that a disruption limited to the organization’s own facility
and campus can be addressed at a different facility and campus. UPS and generators are not limited to serving needs for localized causes. Regulations do not promote cost savings and are not often the immediate concern during BC/DR activities.
Which of the following best describes a sandbox? A. An isolated space where untested code and experimentation can safely occur separate from the production environment. B. A space where you can safely execute malicious code to see what it does. C. An isolated space where transactions are protected from malicious software D. An isolated space where untested code and experimentation can safely occur within the production environment.
Correct Answer: A
Explanation:
Explanation: Options C and B are also correct, but A is more general and incorporates them both. D is incorrect, because sandboxing does not take place in the production environment.
Which of the following best describes data masking? A. A method for creating similar but inauthentic datasets used for software testing and user training. B. A method used to protect prying eyes from data such as social security numbers and credit card data. C. A method where the last few numbers in a dataset are not obscured. These are often used for authentication. D. Data masking involves stripping out all digits in a string of numbers so as to obscure the original number.
Correct Answer: A
Explanation:
Explanation: All of these answers are actually correct, but A is the best answer, because it is the most general, includes the others, and is therefore the optimum choice. This is a good example of the type of question that can appear on the actual exam.
APIs are defined as which of the following? A. A set of protocols, and tools for building software applications to access a web-based software application or tool B. A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or tool C. A set of standards for building software applications to access a web-based software application or tool D. A set of routines and tools for building software applications to access web-based software applications
Correct Answer: B
Explanation:
Explanation: All the answers are true, but B is the most complete.
Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like: A. Ransomware B. Syn floods C. XSS and SQL injection D. Password cracking
Correct Answer: C
Explanation:
Explanation: WAFs detect how the application interacts with the environment, so they are optimal for detecting and refuting things like SQL injection and XSS. Password cracking, syn floods, and ransomware usually aren’t taking place in the same way as injection and XSS, and they are better addressed with controls at the router and through the use of HIDS, NIDS, and antimalware tools.
Which of the following best describes SAML? A. A standard used for directory synchronization B. A standard for developing secure application management logistics C. A standard for exchanging usernames and passwords across devices. D. A standards for exchanging authentication and authorization data between security domains.
Which of the following best describes the purpose and scope of ISO/IEC 27034-1? A. Describes international privacy standards for cloud computing B. Serves as a newer replacement for NIST 800-52 r4 C. Provides on overview of network and infrastructure security designed to secure cloud applications. D. Provides an overview of application security that introduces definitive concepts, principles, and processes involved in application security.