The log file location doesn’t seem like something we would submit with every call, but I could be mistaken. I need to think more about the specifics we reviewed.
I remember practicing a question about API calls, and I feel like the device serial number might be relevant, but it seems less likely than the authorization header.
I think the Authorization header with signature is definitely something we discussed in class, but I'm not entirely sure if it's the only thing we need to submit.
Okay, let me see. Qualitative risk analysis doesn't use precise numbers, so A is out. B sounds right - a risk matrix makes sense for presenting risk in a more general, non-numeric way. I'm leaning towards that as the answer.
Hmm, I'm a little unsure about this one. I know SOC reports are related to audits, but I can't remember the differences between the different types. I'll have to think this through carefully.
Ah, I remember learning about this in class. I believe the correct answer is Python, as it's a widely-used language that's often included in operating system distributions.
Ashanti
5 months agoMargery
5 months agoAliza
5 months agoEdelmira
5 months agoAhmad
5 months agoMarci
6 months agoOlive
6 months agoErasmo
6 months agoNovella
6 months agoParis
6 months agoBarrie
6 months agoArlie
6 months agoCarman
6 months agoJody
6 months ago