1. Right Answer: D
Explanation: The business unit managers and the chief information officer (CIO) are most likely to be considered data owners.
2. Right Answer: C
Explanation: Secure Shell (SSH) is an application and protocol that is used to remotely log in to another computer using a secure tunnel. After a session key is exchanged and the secure channel is established, all communication between the two computers is encrypted over the secure channel.
3. Right Answer: A
Explanation: The sales staff s devices are often targets for attackers.
4. Right Answer: B
Explanation: A policy enforcement point (PEP) is an entity that is protecting the resource that the subject (a user or an application) is attempting to access. When it receives a request from a subject, it creates an XACML request based on the attributes of the subject, the requested action, the resource, and other information.
5. Right Answer: A
Explanation: Data isolation ensures that tenant data in a multitenant solution is isolated from other tenants data via tenant IDs in the data labels.