CIS 502 Course Great Wisdom / tutorialrank.com CIS 502 Course Great Wisdom / tutorialrank.com | Page 20
•
30 An attack on a DNS server to implant forged “A”
records is characteristic of a:
•
31
A defense in depth strategy for anti-malware is
recommended because:
•
32
A security assessment discovered back doors in
an application, and the security manager needs to develop a plan
for detecting and removing back doors in the future. The most
effective countermeasures that should be chosen are:
•
33
“Safe languages” and “safe libraries” are socalled because: