Question 11

A university issues badges through a homegrown identity management system to all staff and students. Each week during the summer, temporary summer school students arrive and need to be issued a badge to access minimal campus resources. The security team received a report from an outside auditor indicating the homegrown system is not consistent with best practices in the security field and leaves the institution vulnerable.
Which of the following should the security team recommend FIRST?
  • Question 12

    Which of the following is the MOST important cloud-specific risk from the CSP's viewpoint?
  • Question 13

    An organization is implementing a new identity and access management architecture with the following objectives:
    Supporting MFA against on-premises infrastructure
    Improving the user experience by integrating with SaaS applications
    Applying risk-based policies based on location
    Performing just-in-time provisioning
    Which of the following authentication protocols should the organization implement to support these requirements?
  • Question 14

    A company has decided to purchase a license for software that is used to operate a mission-critical process. The third-party developer is new to the industry but is delivering what the company needs at this time.
    Which of the following BEST describes the reason why utilizing a source code escrow will reduce the operational risk to the company if the third party stops supporting the application?
  • Question 15

    A company wants to protect its intellectual property from theft. The company has already applied ACLs and DACs.
    Which of the following should the company use to prevent data theft?