00:00

QUESTION 46

- (Exam Topic 8)
When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?

Correct Answer: D

QUESTION 47

- (Exam Topic 15)
A hospital has allowed virtual private networking (VPN) access to remote database developers. Upon auditing the internal firewall configuration, the network administrator discovered that split-tunneling was enabled. What is the concern with this configuration?

Correct Answer: C

QUESTION 48

- (Exam Topic 15)
Which of the following BEST describes the standard used to exchange authorization information between different identity management systems?

Correct Answer: A

QUESTION 49

- (Exam Topic 9)
Which of the following is the BEST way to verify the integrity of a software patch?

Correct Answer: A

QUESTION 50

- (Exam Topic 15)
Write Once, Read Many (WORM) data storage devices are designed to BEST support which of the following core security concepts?

Correct Answer: A