•
40
A source code review uncovered the existence
of instructions that permit the user to bypass security controls.
What was discovered in the code review?
•
41
A hidden means of communication between
two systems has been discovered. This is known as:
•
42
A security officer has declared that a new
information system must be certified before it can be used.
This means:
•
43
A systems engineer is designing a system that
consists of a central computer and attached peripherals. For
fastest throughput, which of the following technologies should
be used for communication with peripheral devices:
•
44
A network manager wishes to simplify
management of all of the network devices in the organization
through centralized authentication. Which of the following
available authentication protocols should the network
manager choose: