CIS 502 MENTOR Education is Power/cis502mentor.com CIS 502 MENTOR Education is Power/cis502mentor.co | Page 26

• 32 An attack on a DNS server to implant forged “ A ” records is characteristic of a :
• 33 “ Safe languages ” and “ safe libraries ” are socalled because :
• 34 A defense in depth strategy for anti-malware is recommended because :
• 35 The most effective countermeasures against input attacks are :
• 36 A database administrator ( DBA ) is responsible for carrying out security policy , which includes controlling which users have access to which data . The DBA has been asked to make just certain fields in some database tables visible to some new users . What is the best course of action for the DBA to take ?
• 37 The following are characteristics of a computer virus EXCEPT :

• 32 An attack on a DNS server to implant forged “ A ” records is characteristic of a :

• 33 “ Safe languages ” and “ safe libraries ” are socalled because :

• 34 A defense in depth strategy for anti-malware is recommended because :

• 35 The most effective countermeasures against input attacks are :

• 36 A database administrator ( DBA ) is responsible for carrying out security policy , which includes controlling which users have access to which data . The DBA has been asked to make just certain fields in some database tables visible to some new users . What is the best course of action for the DBA to take ?

• 37 The following are characteristics of a computer virus EXCEPT :