CIS 502 MENTOR Future Starts Here/cis502mentor.com CIS 502 MENTOR Future Starts Here/cis502mentor.com | Page 15

management , standards , and processes . This model is better known as :
• 12 An organization wishes to purchase an application , and is undergoing a formal procurement process to evaluate and select a product . What documentation should the organization use to make sure that the application selected has the appropriate security-related characteristics ?
• 13 The statement , “ Promote professionalism among information system security practitioners through the provisioning of professional certification and training .” is an example of a / an :
• 14One disadvantage of the use of digital certificates as a means for two-factor authentication is NOT :
• 15 The categories of controls are :
• 16 A biometric authentication system that incorporates the results of newer scans into a user ' s profile is less likely to :
• 17 The use of retina scanning as a biometric authentication method has not gained favor because :
• 18 Buffer overflow , SQL injection , and stack smashing are examples of :
• 19 Which of the following statements about Crossover Error Rate ( CER ) is true :

management , standards , and processes . This model is better known as :

• 12 An organization wishes to purchase an application , and is undergoing a formal procurement process to evaluate and select a product . What documentation should the organization use to make sure that the application selected has the appropriate security-related characteristics ?

• 13 The statement , “ Promote professionalism among information system security practitioners through the provisioning of professional certification and training .” is an example of a / an :

• 14One disadvantage of the use of digital certificates as a means for two-factor authentication is NOT :

• 15 The categories of controls are :

• 16 A biometric authentication system that incorporates the results of newer scans into a user ' s profile is less likely to :

• 17 The use of retina scanning as a biometric authentication method has not gained favor because :

• 18 Buffer overflow , SQL injection , and stack smashing are examples of :

• 19 Which of the following statements about Crossover Error Rate ( CER ) is true :