Answers | Verified | Latest 2024 Version
Under zero trust all network traffic Must be: (Choose all apply)
A. Perimeter-based
B. Authenticated
C. Encrypted
D. Trusted - ✔✔
B. Authenticated
C. Encrypted
Core features of SASE Services do not include
A. CASB
B. ZTSA
C. DNS Protection
D. SD-WAN2. - ✔✔C. DNS Protection
You are developing software, which requires users to enter a date. To prevent security issues, you want
to make sure the values provided by users are accurate. Which technique will you use?
A. Screening
B. Encapsulation
C. Input validation
D. Assurers a user's accountability - ✔✔C. Input validation
Which of the following is NOT a principle of the Agile model of development?
A. Satisfy customers through early and continuous delivery.
B. Prioritize security over other requirements.
C. Business and development work together.
, D. Pay continuous attention to technical excellence - ✔✔B. Prioritize security over other requirements.
Which of the following key is used to enforce referential integrity between database tables?
A. Primary key
B. Foreign key
C. Super key
D. Candidate key - ✔✔B. Foreign key
SaaS providers manage and secure all the following except:
A. Infrastructure
B. OS
C. Application Stacks
D. Access Controls - ✔✔D. Access Controls
Which of the following service providers provides the least amount of built-in security?
A. IaaS
B. PaaS
C. SaaS
D. All the above - ✔✔A. IaaS
Alice's organization requires her to log in with her username, a PIN, a password, and a retina scan. How
many distinct authentication factors are used?
A. One
B. Two
C. Three
D. Four - ✔✔B. Two
Sarah decides to improve the strength of her organization's password policy by increasing the minimum
length of the password by a single character. The system allows the use of upper case and lower case as