•
•
25
Video surveillance is an example of what
type(s) of control:
26
A database administrator (DBA) is responsible
for carrying out security policy, which includes controlling
which users have access to which data. The DBA has been
asked to make just certain fields in some database tables
visible to some new users. What is the best course of action
for the DBA to take?
•
27
•
The most effective countermeasures against
input attacks are:
28
The primary advantage of the use of
workstation-based anti-virus is:
•
29
The purpose for putting a “canary” value in the
stack is:
•
30
An attack on a DNS server to implant forged “A”
records is characteristic of a: