CIS 502 MENTOR Future Starts Here/cis502mentor.com CIS 502 MENTOR Future Starts Here/cis502mentor.com | Page 9

• 40 A source code review uncovered the existence of instructions that permit the user to bypass security controls. What was discovered in the code review? • 41 A hidden means of communication between two systems has been discovered. This is known as: • 42 A security officer has declared that a new information system must be certified before it can be used. This means: • 43 A systems engineer is designing a system that consists of a central computer and attached peripherals. For fastest throughput, which of the following technologies should be used for communication with peripheral devices: • 44 A network manager wishes to simplify management of all of the network devices in the organization through centralized authentication. Which of the following available authentication protocols should the network manager choose: