<< Prev Question Next Question >>

Question 99/103

Which of the following is also knows as white-box test and can be used to find XSS errors, SQL injection.
buffer overflows. unhandled error conditions. and potential backdoors?

Recent Comments (The most recent comments are at the top.)

Vin Vee - Feb 03, 2025

C & D are the same options

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (103q)
Question 1: The intermediary that provides connectivity and transport of...
Question 2: ENISA: A reason for risk concerns of a cloud provider being ...
Question 3: Which of the following is not one of the essential character...
Question 4: Which of the following reports the cloud service provide nor...
Question 5: Which of the following adds abstraction layer on top of netw...
Question 6: Which are the two major categories of network virtualization...
Question 7: CCM: In the CCM tool, a _____________________ is a measure t...
Question 8: Which of the following phases of data security lifecycle typ...
Question 9: What is the main driver for decision to deploy cloud solutio...
Question 10: A health care facility has to only comply with HIPAA and do ...
Question 11: When creating business strategies for cloud migration. which...
Question 12: Which statement best describes why it is important to know h...
Question 13: Enterprise Risk Management is part of over all information R...
Question 14: Which of the following are communications method for compone...
Question 15: Private cloud model can be managed by third party who may no...
Question 16: ln which of the following cloud service models is the custom...
Question 17: Which of the following establishes commonly accepted control...
Question 18: Which is the key mechanism used by organisations that suppor...
Question 19: What is resource pooling?
Question 20: Which of the following will not be provided by cloud service...
Question 21: Which of the following allows organizations to access, repor...
Question 22: Which of the following is an effective way of segregating di...
Question 23: Exploitable bugs in programs that attackers can use to infil...
Question 24: In a cloud scenario. who is the data processor and who is th...
Question 25: ENISA: "VM hopping" is:
Question 26: Network logs from cloud providers are typically flow records...
Question 27: Due to multi-tenancy nature of cloud. there is the possibili...
Question 28: Your cloud and on-premises infrastructures should always use...
Question 29: Cloud customer can do vulnerability assessment of their whol...
Question 30: What is the best way to ensure that all data has been remove...
Question 31: ln which service model. does cloud security provider has lea...
Question 32: What is the key difference between Business Continuity and B...
Question 33: Which of the following is the correct pair of risk managemen...
Question 34: In which cloud service model is the customer only responsibl...
Question 35: Cloud customer and cloud service provider are jointly respon...
Question 36: Stopping a function to control further risk to business is c...
Question 37: When the data is transferred to third party. who is ultimate...
Question 38: Which is the most important trust mechanism between cloud se...
Question 39: Which of the following is NOT atypical approach of Key Stora...
Question 40: Which of the following is key benefit of private cloud model...
Question 41: What is the process to determine any weaknesses in the appli...
Question 42: Which of the following can lead to vendor lock-in?...
Question 43: Metrics which govern the contractual obligations of cloud se...
Question 44: An adversary uses a cloud Platform to launch a DDoS attack a...
Question 45: How does virtualized storage help avoid data loss if a drive...
Question 46: Which of the following is most commonly used to program Appl...
Question 47: Who is responsible for infrastructure Security in Software a...
Question 48: What is true of security as it relates to cloud network infr...
1 commentQuestion 49: Which of the following describes the cloud security referenc...
Question 50: Which term is used to describe the use of tools to selective...
Question 51: In ability to provide enough capacity to the cloud customer ...
Question 52: John said that he is looking for cloud service which is self...
Question 53: Operating System management is done by customer in which ser...
Question 54: ______ refers to the deeper integration of development and o...
Question 55: What refers refer the model that allows customers to scale t...
Question 56: How can virtual machine communications bypass network securi...
Question 57: Which data security control is the LEAST likely to be assign...
Question 58: CCM: In the CCM tool, a is a measure that modifies risk and ...
Question 59: Which of the following are key Data functions?...
Question 60: Which document defines the minimum levels of service availab...
Question 61: Which of the following Standards is normally followed to man...
Question 62: A cloud storage architecture that caches content close to lo...
Question 63: Which of the vulnerabilities is inherited from general softw...
Question 64: Which of the following are two most effective ways of protec...
Question 65: An adversary stole1 million username and passwords of Pass4t...
Question 66: Who is responsible for Data Security in Software as a Servic...
Question 67: What is the key benefit provided to the customer in Infrastr...
Question 68: Which of the following Standards define "Application Securit...
Question 69: What item below allows disparate directory services and inde...
Question 70: Exploitable bugs in programs that attackers can use to infil...
Question 71: Which one of the following is NOT a level of CSA star progra...
Question 72: CCM: The following list of controls belong to which domain o...
Question 73: An important consideration when performing a remote vulnerab...
Question 74: Which one of the following is NOT one of phases for cloud au...
Question 75: What factors should you understand about the data specifical...
Question 76: Which of the followinglS0 Standard provides Code of practice...
Question 77: One of the primary benefits of the cloud is the ability to p...
Question 78: Which communication methods within a cloud environment must ...
Question 79: Which concept provides the abstraction needed for resource p...
Question 80: Which cloud-based service model enables companies to provide...
Question 81: An inherent weakness in an information system. security proc...
Question 82: Credentials and cryptographic keys must not be embedded in s...
Question 83: Cloud applications can use virtual networks and other struct...
Question 84: According to ENISA(European Network and Information Security...
Question 85: Which of the following best describes the relationship betwe...
Question 86: What is the newer application development methodology and ph...
Question 87: Which of the following is a perceived advantage or disadvant...
Question 88: Which of the following reports is of most interest to the cu...
Question 89: Which of the following is a key tool for enabling and enforc...
Question 90: Erin has a picture which he wants to store in the cloud and ...
Question 91: Which of the following help to intermediate IAM between an o...
Question 92: Sending data to a provider's storage over an API is likely a...
Question 93: "Cloud provider acquisition" as a risk fall under which of t...
Question 94: In Platform as a Service (PaaS), platform security is a resp...
Question 95: Logs, documentation, and other materials needed for audits a...
Question 96: Which is the key technology that enables the sharing of reso...
Question 97: Which of the following is NOT one of the common networks und...
Question 98: In which type of environment is it impractical to allow the ...
1 commentQuestion 99: Which of the following is also knows as white-box test and c...
Question 100: Ensuring the use of data and information complies with organ...
Question 101: Which is the set of technologies that are designed to detect...
Question 102: Which of the following is NOT a component of Software Define...
Question 103: Which of the following processes leverages virtual network t...