Question: 1
You are the security manager for an online retail sales company with 100 employees and a production environment hosted in a PaaS model with a major cloud provider.
Your company policies have allowed for a BYOD workforce that work equally from the company offices and their own homes or other locations. The policies also allow users to select which APIs they install and use on their own devices in order to access and manipulate company dat
a.
Of the following, what is a security control you'd like to implement to offset the risk(s) incurred by this practice?
Question: 2
The use of which of the following technologies will NOT require the security dependency of an operating system, other than its own?
Question: 3
Which of the following types of organizations is most likely to make use of open source software technologies?
Question: 4
According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes soon after (or at the same time as) the Create phase?
Question: 5
When an organization considers cloud migrations, the organization's software developers will need to know which _______ and _______ which the organization will be using, in order to properly and securely create suitable applications.