CIS 502 Course Great Wisdom / tutorialrank.com CIS 502 Course Great Wisdom / tutorialrank.com | Page 30
•
24 An information system that processes sensitive
information is configured to require a valid userid and strong
password from any user. This process of accepting and
validating this information is known as:
•
25 What is the best defense against social engineering?
•
26
The following are valid reasons to reduce the
level of privilege for workstation users
•
is:
27 The purpose for putting a “canary” value in the stack
•
28
An organization wants to prevent SQL and script
injection attacks on its Internet web application. The
organization should implement a/an: