exam questions

Exam 350-901 All Questions

View all questions & answers for the 350-901 exam

Exam 350-901 topic 1 question 312 discussion

Actual exam question from Cisco's 350-901
Question #: 312
Topic #: 1
[All 350-901 Questions]

DRAG DROP
-

A developer is designing an application that uses confidential information for a company and its clients. The developer must implement different secret storage techniques for each handled secret to enforce security policy compliance within a project. Drag and drop the security policy requirements from the left onto the storage solutions on the right.

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
johntermlen
Highly Voted 1 year, 11 months ago
SecretA must be accessible only to the application => Source code file encrypted SecretB, which has access control, must be implemented in a secure, per-user fashion => External password manager The development team must have unlimited access to SecretC => Source code file in plain text SecretD must be accessible to anyone who has host access => Environmental variable file
upvoted 11 times
...
lznlxl
Highly Voted 2 years, 5 months ago
An external password manager must be accessible only to the application. A source code file encrypted must be implemented in a secure, per-user fashion. The development team must have unlimited access to the source code file in plain text. The environmental variable file must be accessible to anyone who has host access.
upvoted 9 times
Daimon336
7 months, 1 week ago
An external password manager must be accessible only to the application. -> This makes no sense, the external password manager is for the users to use, thus it is a secretB as it states "per-ser fashion"
upvoted 2 times
...
...
[Removed]
Most Recent 1 year, 2 months ago
SecretA -> environmental variable file SecretB -> external password manager SecretC -> external password manager SecretD -> source code file encrypted
upvoted 1 times
...
JCGO
1 year, 11 months ago
My thoughts: SecretA only application -> source code file encrypted SecretB secure, per-user fashion -> external password manager SecretC dev team unlimited access -> source code plain text SecretD host access -> env variable file
upvoted 5 times
...
adomes
2 years, 1 month ago
secret A is encrypted... Secret B is External... Secret C is Environment... Secret D is Source Code file in plain tex
upvoted 2 times
adomes
2 years, 1 month ago
sorry the answers is Secret A: An external password manager is a good solution for this secret that must be accessible only to the application. Secret B: A source code file encrypted is a good solution for this secret that must be implemented in a secure, per-user fashion. Secret C: The source code file in plain text should be stored in a secure location that can be accessed only by the development team with appropriate access controls, as the development team must have unlimited access to this secret. Secret D: The environmental variable file is not a good solution for this secret that must be accessible to anyone who has host access. Instead, a source code file in plain text can be used to store this secret with appropriate access controls.
upvoted 3 times
...
...
[Removed]
2 years, 5 months ago
I asked ChatGPT and it gave this answer: Secret A must be accessible only to the application. - Environment variable file Secret B, which has access control, must be implemented in a secure, per-user fashion. - External password manager The development team must have unlimited access to Secret C. - Source code file in plain text Secret D must be accessible to anyone who has host access. - Encrypted source code file How confident are you in your answer? I am highly confident in my answer. Based on the security policies provided, I have matched the appropriate storage solutions for each secret. Environment variable file is a good solution for Secret A, which must be accessible only to the application. An external password manager is a good solution for Secret B, which requires per-user access control. A source code file in plain text is a good solution for Secret C, which the development team must have unlimited access to. An encrypted source code file is a good solution for Secret D, which needs to be accessible to anyone who has host access.
upvoted 2 times
...
hatsec
2 years, 5 months ago
1:B 2:A 3:C 4:D
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...