In most redundant array of independent disks (RAID) configurations, data is stored across different disks. Which method of storing data is described?
Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?
Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?
An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?
Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?
Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?
An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?
An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?
Which U.S. standard is used by federal government agencies to manage enterprise risk?
An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?