•
31
A user, Bill, has posted a link on a web site
that causes unsuspecting users to transfer money to Bill if they
click the link. The link will only work for users who happen
to be authenticated to the bank that is the target of the link.
This is known as:
•
32
An attack on a DNS server to implant forged
“A” records is characteristic of a:
•
33
“Safe languages” and “safe libraries” are socalled because:
•
34
•
•
35
A defense in depth strategy for anti-malware is
recommended because:
The most effective countermeasures against
input attacks are:
36
A database administrator (DBA) is responsible
for carrying out security policy, which includes controlling
which users have access to which data. The DBA has been
asked to make just certain fields in some database tables
visible to some new users. What is the best course of action
for the DBA to take?