A recently hired security administrator is advising developers about the secure integration of a legacy in-house application with a new cloud based processing system. The systems must exchange large amounts of fixed format data such as names, addresses, and phone numbers, as well as occasional chunks of data in unpredictable formats. The developers want to construct a new data format and create custom tools to parse and process the data. The security administrator instead suggests that the developers:

Posted by: Pdfprep Category: CAS-002 Tags: , ,

A recently hired security administrator is advising developers about the secure integration of a legacy in-house application with a new cloud based processing system. The systems must exchange large amounts of fixed format data such as names, addresses, and phone numbers, as well as occasional chunks of data in unpredictable formats. The developers want to construct a new data format and create custom tools to parse and process the data. The security administrator instead suggests that the developers:
A . Create a custom standard to define the data.
B . Use well formed standard compliant XML and strict schemas.
C . Only document the data format in the parsing application code.
D . Implement a de facto corporate standard for all analyzed data.

Answer: B

Leave a Reply

Your email address will not be published.