Home
You may like this!
26.
The typical function of Secure Sockets Layer (SSL) in securing Wireless Application Protocol (WAP) is to protect transmissions that exist:
  • A.
    Between the WAP gateway and the wireless endpoint device
  • B.
    Between the web server and the WAP gateway
  • C.
    From the web server to the wireless endpoint device
  • D.
    Between the wireless device and the base station
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The purpose of SSL is to encrypt the communication channel between two end points. In this example, it is the end user and the server.
Report
Name Email  
27.
What is an accounting report on controls at a service organization that replaces older SAS70 type reports?
  • A.
    SOC 1
  • B.
    SSAE16
  • C.
    GAAP
  • D.
    SOC 2
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
The correct answer is the SOC 1 report, which is designed to assess the controls primarily revolving around fi nancial reporting, formerly found in the SAS 70. The SOC 2 is a report that provides information related to one or more of the AICPA fi ve security principles.
Report
Name Email  
28.
What is a company that purchases hosting services from a cloud server hosting or cloud computing provider who then resells to its own customers?
  • A.
    Cloud broker
  • B.
    Cloud computing reseller
  • C.
    Cloud proxy
  • D.
    VAR
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
The cloud computing reseller purchases hosting services and then resells them.
Report
Name Email  
29.
What is a type of computing comparable to grid computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications?
  • A.
    Server hosting
  • B.
    Legacy computing
  • C.
    Cloud computing
  • D.
    Intranet
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Cloud computing is built on the model of grid computing whereby resources can be pooled and shared rather than having local devices do all the compute and storage functions.
Report
Name Email  
30.
What is a set of technologies designed to analyze application source code and binaries for coding and design conditions that are indicative of security and vulnerabilities?
  • A.
    Dynamic application security testing (DAST)
  • B.
    Static application security testing (SAST)
  • C.
    Secure coding
  • D.
    OWASP
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Static application security testing (SAST) differs from dynamic application security testing (DAST) in that it looks at source code and binaries to see if it can detect problems before the code is loaded into memory and run.
Report
Name Email