Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years.
Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled
to be replaced in five years.
Which of the following should Sara do to address the risk?
Elastic cloud computing environments often reuse the same physical hardware for multiple customers over time as virtual machines are instantiated and deleted.
This has important implications for which of the following data security concerns?
The system administrator notices that their application is no longer able to keep up with the large amounts of traffic their server is receiving daily. Several packets
are dropped and sometimes the server is taken offline. Which of the following would be a possible solution to look into to ensure their application remains secure
and available?
Users can authenticate to a company's web applications using their credentials from a popular social media site. Which of the following poses the greatest risk with
this integration?
A company has decided to move large data sets to a cloud provider in order to limit the costs of new infrastructure. Some of the data is sensitive and the Chief
Information Officer wants to make sure both parties have a clear understanding of the controls needed to protect the data.
Which of the following types of interoperability agreement is this?
A security administrator plans on replacing a critical business application in five years. Recently, there was a security flaw discovered in the application that will
cause the IT department to manually re-enable user accounts each month at a cost of $2,000. Patching the application today would cost $140,000 and take two
months to implement. Which of the following should the security administrator do in regards to the application?