// // // // // //
Scott /
/wants /
/to /
/allow /
/users /
/to /
/bring /
/their /
/own /
/credentials /
/to /
/his //website //so //that //they //can //log //in //using //a //Google //or //Microsoft //account //without //giving
//him /
/their /
/passwords. /
/What /
/protocol /
/can /
/he //use //that //will //allow //those //users //to //grant //the //website //access //to //their //information?
OPENID
Tim /
/is /
/working /
/on //
a/
/change /
/to //
a/
/web /
/application /
,/used /
/by //his //organization //to //fix //a //known //bug. //What //environment //should //he //be //working //in?
A
Staging
B
Development
C
Test
D
Production
Development
How //does //technology //diversity //help //ensure //cybersecurity //resilience?
This //task //contains //the //radio //buttons //and //checkboxes //for //options. //Press //the //enter //key //to
//select //the //option.
A
It //means //that //a //misconfiguration //will //not //impact //the //company's //entire //infrastructure.
B
All //of //these.
C
It /
/ensures /
, that //
/
a //vulnerability //in //a //single //company's //product //will //not //impact //the //entire //infrastructure.
D
If //
a/
/single /
/vendor /
/goes //out //of //business, //the //company //does //not //need //to //replace //its //entire //infrastructure.
All
Tonya /
/is /
/concerned /
/about /
/the /
/risk /
/that /
/an /
/attacker /
/will //attempt //to //gain //access //to //her //organization's //database //server. //She //is //searching //for //a
//control /
/that /
/would /
/discourage /
/the /
/attacker /
/from /
/attempting //to //gain //access. //What //type //of //security //control //is //she //seeking //to //implement?
Deterrent