An organization is looking to include mobile devices in its asset management system for better tracking. In which system tier of the reference architecture would mobile devices be tracked?
#271
Answer: B✅ Correct❌ Incorrect
An application team is running tests to ensure that user entry fields will not accept invalid input of any length. What type of negative testing is this an example of?
#272
Answer: A✅ Correct❌ Incorrect
What is considered a compensating control for not having electrical surge protectors installed?
#273
Answer: B✅ Correct❌ Incorrect
What is the FIRST step in risk management?
#274
Answer: A✅ Correct❌ Incorrect
Which of the following is the PRIMARY goal of logical access controls?
#275
Answer: A✅ Correct❌ Incorrect
Which of the following is a covert channel type?
#276
Answer: C✅ Correct❌ Incorrect
A software developer wishes to write code that will execute safely and only as intended. Which of the following programming language types is MOST likely to achieve this goal?
#277
Answer: C✅ Correct❌ Incorrect
Which of the following is a secure design principle for a new product?
#278
Answer: C✅ Correct❌ Incorrect
What is the PRIMARY benefit of relying on Security Content Automation Protocol (SCAP)?
#279
Answer: C✅ Correct❌ Incorrect
Which application type is considered high risk and provides a common way for malware and viruses to enter a network?
#280
Answer: B✅ Correct❌ Incorrect
What are the three key benefits that application developers should derive from the northbound application programming interface (API) of software defined networking (SDN)?
#281
Answer: D✅ Correct❌ Incorrect
Which of the following is a unique feature of attribute-based access control (ABAC)?