CIS 502 All Assignments CIS 502 All Assignments | Page 12

• 34 A defense in depth strategy for anti-malware is recommended because: • 35 The most effective countermeasures against input attacks are: • 36 A database administrator (DBA) is responsible for carrying out security policy, which includes controlling which users have access to which data. The DBA has been asked to make just certain fields in some database tables visible to some new users. What is the best course of action for the DBA to take? • 37 The following are characteristics of a computer virus EXCEPT: • 38 A list of all of the significant events that occur in an application is known as: • 39 The purpose of a parallel test is: • 40 The first priority for disaster response should be: • 41 In what sequence should a disaster recovery planning project be performed? • 42 For the purpose of business continuity and disaster recovery planning, the definition of a “disaster” is: • 43 The purpose of a server cluster includes all of the following EXCEPT: • 44 The definition of Recovery Point Objective (RPO) is: