CIS 502 MENTOR Future Starts Here/cis502mentor.com CIS 502 MENTOR Future Starts Here/cis502mentor.com | Page 17

• 29 The instructions contained with an object are known as its :
• 30 Rootkits can be difficult to detect because :
• 31 A user , Bill , has posted a link on a web site that causes unsuspecting users to transfer money to Bill if they click the link . The link will only work for users who happen to be authenticated to the bank that is the target of the link . This is known as :
• 32 An attack on a DNS server to implant forged “ A ” records is characteristic of a :
• 33 “ Safe languages ” and “ safe libraries ” are socalled because :
• 34 A defense in depth strategy for anti-malware is recommended because :
• 35 The most effective countermeasures against input attacks are :
• 36 A database administrator ( DBA ) is responsible for carrying out security policy , which includes controlling which users have access to which data . The DBA has been asked to make just certain fields in some database tables visible to some new users . What is the best course of action for the DBA to take ?

• 29 The instructions contained with an object are known as its :

• 30 Rootkits can be difficult to detect because :

• 31 A user , Bill , has posted a link on a web site that causes unsuspecting users to transfer money to Bill if they click the link . The link will only work for users who happen to be authenticated to the bank that is the target of the link . This is known as :

• 32 An attack on a DNS server to implant forged “ A ” records is characteristic of a :

• 33 “ Safe languages ” and “ safe libraries ” are socalled because :

• 34 A defense in depth strategy for anti-malware is recommended because :

• 35 The most effective countermeasures against input attacks are :

• 36 A database administrator ( DBA ) is responsible for carrying out security policy , which includes controlling which users have access to which data . The DBA has been asked to make just certain fields in some database tables visible to some new users . What is the best course of action for the DBA to take ?