CIS 502 MENTOR Education is Power/cis502mentor.com CIS 502 MENTOR Education is Power/cis502mentor.co | Page 26
• 32 An attack on a DNS server to implant forged“ A” records is characteristic of a:
• 33“ Safe languages” and“ safe libraries” are socalled because:
• 34 A defense in depth strategy for anti-malware is recommended because:
• 35 The most effective countermeasures against input attacks are:
• 36 A database administrator( DBA) is responsible for carrying out security policy, which includes controlling which users have access to which data. The DBA has been asked to make just certain fields in some database tables visible to some new users. What is the best course of action for the DBA to take?
• 37 The following are characteristics of a computer virus EXCEPT:
• 32 An attack on a DNS server to implant forged“ A” records is characteristic of a:
• 33“ Safe languages” and“ safe libraries” are socalled because:
• 34 A defense in depth strategy for anti-malware is recommended because:
• 35 The most effective countermeasures against input attacks are:
• 36 A database administrator( DBA) is responsible for carrying out security policy, which includes controlling which users have access to which data. The DBA has been asked to make just certain fields in some database tables visible to some new users. What is the best course of action for the DBA to take?
• 37 The following are characteristics of a computer virus EXCEPT: