Question 11
A financial services company has proprietary trading algorithms, which were created and are maintained by a team of developers on their private source code repository. If the details of this operation became known to competitors, the company's ability to profit from its trading would disappear immediately. Which of the following would the company MOST likely use to protect its trading algorithms?
Question 12
A vendor develops a mobile application for global customers. The mobile application supports advanced encryption of data between the source (the mobile device) and the destination (the organization's ERP system).
As part of the vendor's compliance program, which of the following would be important to take into account?
As part of the vendor's compliance program, which of the following would be important to take into account?
Question 13
A corporation with a BYOO policy is very concerned about issues that may arise from data ownership. The corporation is investigating a new MOM solution and has gathered the following requirements as part of the requirements-gathering phase
* Each device must be issued a secure token of trust from the corporate PKl
* Al corporate applications and local data must be able to be deleted from a central console.
* Access to corporate data must be restricted on international travel
* Devices must be on the latest OS version within three weeks of an OS release Which of the following should be features in the new MDM solution to meet these requirements? (Select TWO)
* Each device must be issued a secure token of trust from the corporate PKl
* Al corporate applications and local data must be able to be deleted from a central console.
* Access to corporate data must be restricted on international travel
* Devices must be on the latest OS version within three weeks of an OS release Which of the following should be features in the new MDM solution to meet these requirements? (Select TWO)
Question 14
The latest independent research shows that cyber attacks involving SCADA systems grew an average of 15% per year in each of the last four years, but that this year's growth has slowed to around 7%. Over the same time period, the number of attacks against applications has decreased or stayed flat each year. At the start of the measure period, the incidence of PC boot loader or BIOS based attacks was negligible. Starting two years ago, the growth in the number of PC boot loader attacks has grown exponentially. Analysis of these trends would seem to suggest which of the following strategies should be employed?
Question 15
To meet a SLA, which of the following document should be drafted, defining the company's internal interdependent unit responsibilities and delivery timelines.