Question: 1
Which of the following is TRUE for an organization that is using a third-party federated identity service?
Question: 2
Which of the following types of web-based attack is happening when an attacker is able to send a well-crafted, malicious request to an authenticated user without the user realizing it?
Question: 3
The core component of Role Based Access control (RBAC) must be constructed of defined data elements, Which elements are requried?
A Users, permissions, operators, and protected objects
B Users, rotes, operations, and protected objects
C Roles, accounts, permissions, and protected objects
D Roles, operations, accounts, and protected objects
Answer : B
Show Answer
Hide Answer
Question: 4
Which of the following departments initiates the request, approval, and provisioning business process?
Question: 5
Which of the following is strategy of grouping requirements in developing a security Test and Evaluation (ST&E)?