You put a newly purchased server as the webserver onto a rack, launch a new virtual machine, and assign network interfaces to support supply chain integration. Which of the following best manages the provisioning process? (Wentz QOTD) A. Infrastructure management B. Configuration management C. Observability management D. Pipeline management
Which of the following is most commonly used to automate the process of creating and managing entities and attributes across information systems when a new employee gets onboard? (Wentz QOTD) A. SPML B. SAML C. XACML D. OIDC
Which of the following is responsible for taking into account risks of varying likelihood and severity for the rights and freedoms of one who can be identified, directly or indirectly? (Wentz QOTD) A. Data owner B. Information system owner C. Data controller D. Data principal
Which of the following is least related to the compliance with cross-border requirements? (Wentz QOTD) A. Wassenaar Arrangement B. General Data Protection Regulation (GDPR) C. Border Gateway Protocol (BGP) D. Content Delivery Network (CDN)
Which of the following provides the most timely software quality control? (Wentz QOTD) A. Regression testing B. Pair programming C. Fagan inspection D. Dynamic application security testing
Your organization initiated a program to implement the business continuity management system (BCMS) based on ISO 22301. Which of the following should be conducted first to implement the program? (Wentz QOTD) A. Return on investment analysis B. Cost-benefit analysis C. SWOT analysis D. Business impact analysis
A web server sends an authentication code to the user’s mobile phone through short messages after validating the user credential. To reduce the web server’s workload, the architect has the stateless web server send a cookie containing authentication code to shift authentication code validation to browsers. To validate the authentication code input by the user, which of the following is the best design to protect the authentication code in the cookie responded by the web server in terms of the economy of mechanism principle? (Wentz QOTD) A. Send the authentication code in plain text to boost performance and scalability B. Encrypt the authentication code using a proprietary encryption algorithm designed by a security expert C. Encrypt the authentication code using the Advanced Encryption Standard (AES) D. Send the unencrypted hash of the authentication code