Question 521

During an audit, an information security analyst discovers accounts that are stil assigned to employees who no longer work for the company and new accounts that need to be verified against a list of authorized users. This type of auditing supports the development of:
  • Question 522

    A development team releases updates to an application regularly. The application is compiled with several standard open-source security products that require a minimum version for compatibility. During the security review portion of the development cycle, which of the following should be done to minimize possible application vulnerabilities?
  • Question 523

    An administrator is tasked with securing several website domains on a web server. The administrator elects to secure www.example.com, mail.example.org, archive.example.com, and www.example.org with the same certificate. Which of the following would allow the administrator to secure those domains with a single issued certificate?
  • Question 524

    The following has been discovered in an internally developed application:
    Error - Memory allocated but not freed:
    char *myBuffer = malloc(BUFFER_SIZE);
    if (myBuffer != NULL) {
    *myBuffer = STRING_WELCOME_MESSAGE;
    printf("Welcome to: %s\n", myBuffer);
    }
    exit(0);
    Which of the following security assessment methods are likely to reveal this security weakness?
    (Select TWO).
  • Question 525

    A security administrator is updating a company's SCADA authentication system with a new application. To ensure interoperability between the legacy system and the new application, which of the following stakeholders should be involved in the configuration process before deployment? (Choose two.)