- (Exam Topic 8)
When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?
Correct Answer:
D
- (Exam Topic 15)
A hospital has allowed virtual private networking (VPN) access to remote database developers. Upon auditing the internal firewall configuration, the network administrator discovered that split-tunneling was enabled. What is the concern with this configuration?
Correct Answer:
C
- (Exam Topic 15)
Which of the following BEST describes the standard used to exchange authorization information between different identity management systems?
Correct Answer:
A
- (Exam Topic 9)
Which of the following is the BEST way to verify the integrity of a software patch?
Correct Answer:
A
- (Exam Topic 15)
Write Once, Read Many (WORM) data storage devices are designed to BEST support which of the following core security concepts?
Correct Answer:
A