Question 21
A security analyst is reviewing the security of a SaaS application that the company intends to purchase.
Which of the following documentations should the security analyst request from the SaaS application vendor?
Which of the following documentations should the security analyst request from the SaaS application vendor?
Question 22
A systems administrator is working on a solution with the following requirements:
* Provide a secure zone.
* Enforce a company-wide access control policy.
* Reduce the scope of threats.
Which of the following is the systems administrator setting up?
* Provide a secure zone.
* Enforce a company-wide access control policy.
* Reduce the scope of threats.
Which of the following is the systems administrator setting up?
Question 23
An organization is adopting cloud services at a rapid pace and now has multiple SaaS applications in use. Each application has a separate log-in. so the security team wants to reduce the number of credentials each employee must maintain. Which of the following is the first step the security team should take?
Question 24
A software developer would like to ensure. The source code cannot be reverse engineered or debugged.
Which of the following should the developer consider?
Which of the following should the developer consider?
Question 25
Which of the following should be used to ensure a device is inaccessible to a network-connected resource?
