Question: 1
Which of the following is characterized by a set maximum capacity?
Response:
Question: 2
What are the six components that make up the STRIDE threat model?
Response:
A Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege
B Spoofing, Tampering, Non-Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege
C Spoofing, Tampering, Repudiation, Information Disclosure, Distributed Denial of Service, and Elevation of Privilege
D Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Social Engineering
Answer : A
Show Answer
Hide Answer
Question: 3
You are the security manager for a small application development company. Your company is considering the use of the cloud for software testing purposes. Which cloud service model is most likely to suit your needs?
Response:
Question: 4
Which of the following is not one of the defined security controls domains within the Cloud Controls Matrix, published by the Cloud Security Alliance?
Response:
Question: 5
The cloud deployment model that features joint ownership of assets among an affinity group is known as:
Response: