•
31
A defense in depth strategy for anti-malware is
recommended because:
•
32
A security assessment discovered back doors in
an application, and the security manager needs to develop a
plan for detecting and removing back doors in the future. The
most effective countermeasures that should be chosen are:
•
•
33
“Safe languages” and “safe libraries” are socalled because:
•
34
The instructions contained with an object are
known as its:
35
A user, Bill, has posted a link on a web site that
causes unsuspecting users to transfer money to Bill if they
click the link. The link will only work for users who happen
to be authenticated to the bank that is the target of the link.
This is known as:
•
36
What is the most effective countermeasure
against script injection attacks?