1. During the design of a new application, the programmers need to determine the performance and security impact of the new application on the enterprise. Who should collaborate with the programmers to determine this information?
A) executive management
B) network administrator
C) database administrator
D) physical security manager
2. Management expresses concerns about using multitenant public cloud solutions to store organizational data. You explain thattenant data in a multitenant solution is quarantined from other tenants - data, using tenant IDs in the data labels. What is the term for this process?
A) data isolation
B) data purging
C) data aggregation
D) data remnants
3. You would like to prevent users from using a password again when it is time to change their passwords. What policy do youneed to implement?
A) authentication period
B) password life
C) password history
D) password complexity
4. A forensic investigator is collecting evidence of a recent attack at your organization. You are helping him preserve the evidence for use in the lawsuit that your company plans to bring against the attackers. Which of the following is not one of the five rules of evidence?
A) Be accurate.
B) Be volatile.
C) Be convincing.
D) Be admissible.
5. Which of the following is an example of a crypto processor?
A) TPM chip
B) Microsoft CryptoAPI (CAPI)
C) token
D) CSP