CIS 502 MENTOR Future Starts Here/cis502mentor.com CIS 502 MENTOR Future Starts Here/cis502mentor.com | Page 13

to evaluate and select a product. What documentation should the organization use to make sure that the application selected has the appropriate security-related characteristics? • 13 An organization suffered a virus outbreak when malware was download by an employee in a spam message. This outbreak might not have happened had the organization followed what security principle: • 14 • Which of the following is NOT an authentication protocol: 15 The categories of controls are: • 16 Organizations that implement two-factor authentication often do not adequately plan. One result of this is: • 17 Buffer overflow, SQL injection, and stack smashing are examples of: