66 The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is created by a member-driven OWASP committee of application development experts and published approximately every 24 months. The OWASP Top Ten list often includes “cross-site request forgery” (CSRF). A CSRF attack might be used for all the following malicious actions except _______________.The attacker could have the user log into one of the user’s online accounts.The attacker could collect the user’s online account login credentials, to be used by the attacker later.The attacker could have the user perform an action in one of the user’s online accounts.The attacker could trick the user into calling a fraudulent customer service number hosted by the attacker and talk the user into disclosing personal information.
67 The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is created by a member-driven OWASP committee of application development experts and published approximately every 24 months. The OWASP Top Ten list often includes “cross-site request forgery” (CSRF). Which of the following is a good way to deter CSRF attacks?Have your website refuse all HTTP resource requests.Ensure that all HTTP resource requests include a unique, unpredictable token.Don’t allow e-commerce on your website.Process all user requests with only one brand of browser, and refuse all resource requests from other browsers.
68 The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is created by a member-driven OWASP committee of application development experts and published approximately every 24 months. The OWASP Top Ten list often includes “using components with known vulnerabilities.” Which of the following is a good way to protect against this problem?Use only components your organization has written.Update to current versions of component libraries as soon as possible.Never use anyone else’s component library.Apply patches to old component libraries.
69 The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is created by a member-driven OWASP committee of application development experts and published approximately every 24 months. The OWASP Top Ten list often includes “using components with known vulnerabilities.” Why would an organization ever use components with known vulnerabilities to create software?The organization is insured.The particular vulnerabilities exist only in a context not being used by developers.Some vulnerabilities exist only in foreign countries.A component might have a hidden vulnerability.
70 The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is created by a member-driven OWASP committee of application development experts and published approximately every 24 months. The OWASP Top Ten list often includes “using components with known vulnerabilities.” Which of the following is a good way to protect against this problem?Use only standard libraries.Review all updates/lists/notifications for components your organization uses.Be sure to HTML escape all attribute elements.Increase the user training budget.
71 The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats created by a member-driven OWASP committee of application development experts and published approximately every 24 months. The OWASP Top Ten list sometimes includes “unvalidated redirects and forwards.” Which of the following is a good way to protect against this problem?HTML escape all HTML attributes.Train users to recognize invalidated links.Block all inbound resource requests.Implement audit logging.
72 The Open Web Application Security Project (OWASP) Top Ten is a list of web application security threats that is created by a member-driven OWASP committee of application development experts and published approximately every 24 months. The OWASP Top Ten list often includes “unvalidated redirects and forwards.” Which of the following is a good way to protect against this problem?Don’t use redirects/forwards in your applications.Refrain from storing credentials long term.Implement security incident/event monitoring (security information and event management [SIEM]/security information management [SIM]/security event management [SEM]) solutions.Implement digital rights management (DRM) solutions.
73 You are the security subject matter expert (SME) for an organization considering a transition from a traditional IT enterprise environment into a hosted cloud provider’s data center. One of the challenges you’re facing is whether your current applications in the on-premises environment will function properly with the provider’s hosted systems and tools. This is a(n) _______________ issue.InteroperabilityPortabilityStabilitySecurity
74 You are the security subject matter expert (SME) for an organization considering a transition from a traditional IT enterprise environment into a hosted cloud provider’s data center. One of the challenges you’re facing is whether the provider will have undue control over your data once it is within the provider’s data center; will the provider be able to hold your organization hostage because they have your data? This is a(n) _______________ issue.InteroperabilityPortabilityStabilitySecurity
75 You are the security subject matter expert (SME) for an organization considering a transition from a traditional IT enterprise environment into a hosted cloud provider’s data center. One of the challenges you’re facing is whether the cloud provider will be able to comply with the existing legislative and contractual frameworks your organization is required to follow. This is a _______________ issue.ResiliencyPrivacyPerformanceRegulatory
76 You are the security subject matter expert (SME) for an organization considering a transition from a traditional IT enterprise environment into a hosted cloud provider’s data center. One of the challenges you’re facing is whether the cloud provider will be able to allow your organization to substantiate and determine with some assurance that all of the contract terms are being met. This is a(n) _______________ issue.RegulatoryPrivacyResiliencyAuditability
77 Encryption is an essential tool for affording security to cloud-based operations. While it is possible to encrypt every system, piece of data, and transaction that takes place on the cloud, why might that not be the optimum choice for an organization?Key length variances don’t provide any actual additional security.It would cause additional processing overhead and time delay.It might result in vendor lockout.The data subjects might be upset by this.
78 Encryption is an essential tool for affording security to cloud-based operations. While it is possible to encrypt every system, piece of data, and transaction that takes place on the cloud, why might that not be the optimum choice for an organization?It could increase the possibility of physical theft.Encryption won’t work throughout the environment.The protection might be disproportionate to the value of the asset(s).Users will be able to see everything within the organization.
79 Which of the following is not an element of the identification component of identity and access management (IAM)?ProvisioningManagementDiscretionDeprovisioning
80 Which of the following entities is most likely to play a vital role in the identity provisioning aspect of a user’s experience in an organization?The accounting departmentThe human resources (HR) officeThe maintenance teamThe purchasing office
81 Why is the deprovisioning element of the identification component of identity and access management (IAM) so important?Extra accounts cost so much extra money.Open but unassigned accounts are vulnerabilities.User tracking is essential to performance.Encryption has to be maintained.
82 All of the following are reasons to perform review and maintenance actions on user accounts except _______________.To determine whether the user still needs the same accessTo determine whether the user is still with the organizationTo determine whether the data set is still applicable to the user’s roleTo determine whether the user is still performing well
83 Who should be involved in review and maintenance of user accounts/access?The user’s managerThe security managerThe accounting departmentThe incident response team
84 Which of the following protocols is most applicable to the identification process aspect of identity and access management (IAM)?Secure Sockets Layer (SSL)Internet Protocol Security (IPSec)Lightweight Directory Access Protocol (LDAP)Amorphous ancillary data transmission (AADT)
85 Privileged