(Answered) CS CYBER SECU CCSK Exam 5 Pace University Guaranteed Success
(ANSWERED) CS CYBER SECU CCSK Exam 2 |Pace University Your answers are shown below: 1. Identity and Access Management (IAM) includes which of the following? ◦ Identification, authentication and authorization • Identification, authentication, authorization and non-repudiation • Identification, authentication, authorization and encryption • Identification, authentication, authorization and delegation • Identification, authentication, authorization and deletion Question was not answered 2. In which of the five main phases of secure application design and development, you perform Threat Modelling? ◦ Training ◦ Define • Design • Develop • Test Question was not answered 3. When entrusting a third party to process the data on its behalf, who remains responsible for the collection and processing of the data? ◦ Data Processor • Data Controller • Data Analyzer • Data Protector Question was not answered 4. Attestations and certifications are activities that will be valid at any future point in time and providers must keep any published results readily available for quick reference. ◦ True • False Question was not answered 5. The Cloud Security Alliance STAR Registry is used for which of the following purposes? ◦ Used by cloud providers to document their security and compliance controls ◦ List all cloud security controls mapped to multiple security standards • To publicly release certifications and attestations • Used by cloud providers to keep all the service contracts and service level agreements Question was not answered
Written for
- Institution
- Pace University
- Course
- CS CYBER SECU CCSK
Document information
- Uploaded on
- February 22, 2023
- Number of pages
- 24
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
authenticat
-
answered cs cyber secu ccsk exam 2 |pace university your answers are shown below 1 identity and access management iam includes which of the following ◦ identification