Question: 1
Which of the following top security threats involves attempting to send invalid commands to an application in an attempt to get the application to execute the code?
Response:
Question: 2
Which of the following best describes SAML?
Response:
Question: 3
Using one cloud provider for your operational environment and another for your BCDR backup will also give you the additional benefit of ____________.
Response:
Question: 4
Heating, ventilation, and air conditioning (HVAC) systems cool the data center by pushing warm air into ____________.
Response:
Question: 5
You work for a government research facility. Your organization often shares data with other government research organizations.
You would like to create a single sign-on experience across the organizations, where users at each organization can sign in with the user ID/authentication issued by that organization, then access research data in all the other organizations.
Instead of replicating the data stores of each organization at every other organization (which is one way of accomplishing this goal), you instead want every user to have access to each organization's specific storage resources.
If you don't use cross-certification, what other model can you implement for this purpose?
Response: