to evaluate and select a product. What documentation should
the organization use to make sure that the application selected
has the appropriate security-related characteristics?
•
13
An organization suffered a virus outbreak when
malware was download by an employee in a spam message.
This outbreak might not have happened had the organization
followed what security principle:
•
14
•
Which of the following is NOT an
authentication protocol:
15
The categories of controls are:
•
16
Organizations that implement two-factor
authentication often do not adequately plan. One result of this
is:
•
17
Buffer overflow, SQL injection, and stack
smashing are examples of: