Question: 1
Which of the following is TRUE for an organization that is using a third-party federated identity service?
Question: 2
Which of the following types of web-based attack is happening when an attacker is able to send a well-crafted, malicious request to an authenticated user without the user realizing it?
Question: 3
An organization is considering outsourcing applications and data to a Cloud Service
Provider (CSP). Which of the following is the MOST important concern regarding
privacy?
Question: 4
Individuls have been identified and determined as having a need-to-know for the information. Which of the following access control methods MUST include a consistent set of rules for controlling and limiting access?
Question: 5
An organization has implemented a new backup process which protects confidential
data by encrypting the information stored on backup tapes. Which of the following is a
MAJOR data confidentiality concern after the implementation of this new backup
process?