A programmer is creating a program that makes a decision based on user input and has decided to use a
branching statement. Which of the following commands would be BEST for the programmer to use?
A program will request user input and perform an operation several times if the input is correct. Which of the
following techniques BEST describes the fact that the operation is only performed if the input is correct?
A security administrator needs to set up multifactor authentication for a cloud application. Which of the following
should the administrator use to establish an authentication process? (Choose two.)
A. Logs B. Password C. Receipt D. Encryption E. Database F. Software token
A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a
limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?
A. Loss of revenue in case of a breach B. Difficulty of integration C. Training involved for IT staff and users D. Amount of equipment that will be replaced
Correct Answer: A
Please disable your adblocker or whitelist this site!