0% found this document useful (0 votes)
46 views

Expert Veri Ed, Online, Free.: Custom View Settings

This document discusses the importance of modifying the systems development life cycle (SDLC) process to address application security in a cloud computing environment. Specifically, it recommends updating threat and trust models to account for the shared responsibility model of cloud security between providers and customers. No other modifications to the SDLC are needed according to the document.

Uploaded by

xanin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

Expert Veri Ed, Online, Free.: Custom View Settings

This document discusses the importance of modifying the systems development life cycle (SDLC) process to address application security in a cloud computing environment. Specifically, it recommends updating threat and trust models to account for the shared responsibility model of cloud security between providers and customers. No other modifications to the SDLC are needed according to the document.

Uploaded by

xanin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

- Expert Verified, Online, Free.

 Custom View Settings

Question #71 Topic 1

How should an SDLC be modified to address application security in a Cloud Computing environment?

A. Integrated development environments

B. Updated threat and trust models Most Voted

C. No modification is needed

D. Just-in-time compilers

E. Both B and C

Correct Answer: A

Community vote distribution


B (80%) A (20%)

Question #72 Topic 1

Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?

A. Data Security and Encryption

B. Information Governance

C. Incident Response, Notification and Remediation

D. Compliance and Audit Management

E. Infrastructure Security

Correct Answer: C

Community vote distribution


C (100%)
Question #73 Topic 1

Which opportunity helps reduce common application security issues?

A. Elastic infrastructure

B. Default deny

C. Decreased use of micro-services

D. Segregation by default Most Voted

E. Fewer serverless configurations

Correct Answer: A

Community vote distribution


D (78%) A (22%)

Question #74 Topic 1

What is the most significant security difference between traditional infrastructure and cloud computing?

A. Management plane

B. Intrusion detection options

C. Secondary authentication factors

D. Network access points

E. Mobile security configuration options

Correct Answer: A

Community vote distribution


A (100%)

Question #75 Topic 1

A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.

A. False

B. True

Correct Answer: A

Community vote distribution


A (100%)

 Previous Questions Next Questions 

You might also like