- (Exam Topic 12)
During the Security Assessment and Authorization process, what is the PRIMARY purpose for conducting a hardware and software inventory?
Correct Answer:
A
- (Exam Topic 10)
What component of a web application that stores the session state in a cookie can be bypassed by an attacker?
Correct Answer:
C
- (Exam Topic 9)
Which of the following is a physical security control that protects Automated Teller Machines (ATM) from skimming?
Correct Answer:
A
- (Exam Topic 13)
An organization has outsourced its financial transaction processing to a Cloud Service Provider (CSP) who will provide them with Software as a Service (SaaS). If there was a data breach who is responsible for monetary losses?
Correct Answer:
B
- (Exam Topic 9)
Which of the following actions should be performed when implementing a change to a database schema in a production system?
Correct Answer:
D