- (Exam Topic 3)
A user signs on to a cloud-based social media platform. In another browser tab, the user finds an article worth posting to the social media platform. The user clicks on the platform’s icon listed on the article’s website, and the article is automatically posted to the user’s account on the social media platform.
This is an example of what?
Response:
Correct Answer:
C
- (Exam Topic 2)
Which one of the following is not one of the three common threat modeling techniques? Response:
Correct Answer:
D
- (Exam Topic 3)
Which of the following is an example of useful and sufficient data masking of the string “CCSP”? Response:
Correct Answer:
C
- (Exam Topic 2)
Although performing BCDR tests at regular intervals is a best practice to ensure processes and documentation are still relevant and efficient, which of the following represents a reason to conduct a BCDR review outside of the regular interval?
Response:
Correct Answer:
B
- (Exam Topic 3)
Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like: Response:
Correct Answer:
C