•
24 An information system that processes sensitive
information is configured to require a valid userid and strong
password from any user. This process of accepting and
validating this information is known as:
•
•
25 What is the best defense against social
engineering?
26
•
The following are valid reasons to reduce the
level of privilege for workstation users
27 The purpose for putting a “canary” value in the
stack is:
•
28
An organization wants to prevent SQL and
script injection attacks on its Internet web application. The
organization should implement a/an:
•
29
•
30
The instructions contained with an object are
known as its:
Rootkits can be difficult to detect because: