1. A security architect is reviewing the implementation phase of the SDLC for a new HR software system for security holes. With the project under a tight schedule delivery market to meet obligations to project, which of the following security activities needs to be prioritized by the security architect? (Choose two).(Select 3answers)
A) Perform penetration testing on the HR solution for technical vulnerabilities
B) Enter access testing to ensure that privileges are configured correctly
C) Determine whether the information security standards are respected by the project
D) Enter to close a security risk assessment with the recommended solutions for high-rated risks
E) Enter to close a security risk assessment with the recommended solutions for high-rated risks
2. An employee is performing an evaluation of security of the organization and saw a cross on the responsibilities between the IT security team and the financial team of fraud. Which of the following security documents should be used to clarify the roles and responsibilities between the teams?
A) None
B) BIA
C) BPA
D) MOU
E) OLA
3. In an effort to minimize costs, managing a small candy company wants to find a cloud service option for the development of online applications. The company does not invest in IT infrastructure. Which of the following recommended?
A) Own SaaS
B) A public PaaS
C) None
D) A public SaaS
E) A public IaaS
4. Using SSL, an administrator wants to protect public-facing server farms in three subdomains: dc1.east.company.com, dc2.central.company.com and dc3.west.company.com. Which of the following is the number of wildcard SSL certificates to be purchased?
A) 3
B) 6
C) None
D) 1
E) 0
5. A company trying to decide how to manage hosts on a branch over a slow WAN link. The company plans to offer the same level of performance and functionality to the branch as it provides the campus. The company uses Active Directory directory service and the host configuration management. The branch has no data center's physical security posture of the building is weak. Which of the following version is best suited for this scenario?
A) Implement a corporate Read-Only Domain Controller to the branch location.
B) Implement a branch Read-Only Domain Controller in the demilitarized zone on the campus with a two-way trust relationship.
C) Implement a corporate domain controller in the demilitarized zone on campus.
D) Implement a Read-Only Domain Controller branch to branch location with a one-way trust.
E) Implement a corporate domain controller to the branch location