TQ Session - Security
TQ Session - Security
TQ Session - Security
Create a universal security solution to fit the needs of all clients. Accenture's unique
platform can be embedded in any client architecture.
Help the client create a secure, in-house data center, that follows international regulations
such as ISO 27001.
Address the client’s security risks only after they arrive. A data breach opens all doors on
selling new security deals.
Use a complete offshore security practice of security experts to monitor security events.
Create a cybersecurity team of internal, client team experts who partner with external
experts, whose focus is strictly internal audits.
Create an improved operational technical security practice that leverages new and
improved practices.
Which term refers to the process of creating and
deploying applications that are secure from the start?
Waterfall
Risk Management
Compliance Assessment
DevOps
Users who were recently hired within an organization should hold the lowest levels of
user permissions.
Permanent access to an organization’s most critical assets should be limited to the current
administrator.
Accenture recommends that the additional security controls are not needed since the
Cloud is secure by default.
Social Engineering
Money Laundering
Governance
Accessibility
Risk Management
Cloud Computing
Access Management
Security Operations
An employee deletes all files associated with an important project on an internal server.
A Data Analyst accesses an Excel data file on a team webpage and creates a pivot table
with survey responses.