Question 21

A security analyst is reviewing the security of a SaaS application that the company intends to purchase.
Which of the following documentations should the security analyst request from the SaaS application vendor?
  • Question 22

    A systems administrator is working on a solution with the following requirements:
    * Provide a secure zone.
    * Enforce a company-wide access control policy.
    * Reduce the scope of threats.
    Which of the following is the systems administrator setting up?
  • Question 23

    An organization is adopting cloud services at a rapid pace and now has multiple SaaS applications in use. Each application has a separate log-in. so the security team wants to reduce the number of credentials each employee must maintain. Which of the following is the first step the security team should take?
  • Question 24

    A software developer would like to ensure. The source code cannot be reverse engineered or debugged.
    Which of the following should the developer consider?
  • Question 25

    Which of the following should be used to ensure a device is inaccessible to a network-connected resource?