The security administrator instead suggests that the de…

A recently hired security administrator is advising developers about the secure integration of a legacy in-house
application with a new cloud based processing system. The systems must exchange large amounts of fixed
format data such as names, addresses, and phone numbers, as well as occasional chunks of data in
unpredictable formats. The developers want to construct a new data format and create custom tools to parse
and process the data. The security administrator instead suggests that the developers:

A recently hired security administrator is advising developers about the secure integration of a legacy in-house
application with a new cloud based processing system. The systems must exchange large amounts of fixed
format data such as names, addresses, and phone numbers, as well as occasional chunks of data in
unpredictable formats. The developers want to construct a new data format and create custom tools to parse
and process the data. The security administrator instead suggests that the developers:

A.
Create a custom standard to define the data.

B.
Use well formed standard compliant XML and strict schemas.

C.
Only document the data format in the parsing application code.

D.
Implement a de facto corporate standard for all analyzed data.



Leave a Reply 0

Your email address will not be published. Required fields are marked *