CIS 502 Course Great Wisdom / tutorialrank.com CIS 502 Course Great Wisdom / tutorialrank.com | Page 20

• 30 An attack on a DNS server to implant forged “A” records is characteristic of a: • 31 A defense in depth strategy for anti-malware is recommended because: • 32 A security assessment discovered back doors in an application, and the security manager needs to develop a plan for detecting and removing back doors in the future. The most effective countermeasures that should be chosen are: • 33 “Safe languages” and “safe libraries” are socalled because: