Question: 1
Which of the following is a risk in the cloud environment that is not existing or is as prevalent in the legacy environment?
Response:
Question: 2
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Management is interested in adopting an Agile development style.
This will be typified by which of the following traits?
Response:
Question: 3
The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is composed by a member-driven OWASP committee of application development experts and published approximately every 24 months. The 2013 OWASP Top Ten list includes ''sensitive data exposure.''
Which of these is a technique to reduce the potential for a sensitive data exposure?
Response:
Question: 4
Data labels could include all the following, except:
Response:
Question: 5
Which of the following is not an enforceable governmental request?
Response: