CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 24
•
22
•
Video surveillance is an example of what type(s)
of control:
23 Which of the following is NOT an authentication
protocol:
•
24 An information system that processes sensitive
information is configured to require a valid userid and strong
password from any user. This process of accepting and
validating this information is known as:
•
25 What is the best defense against social engineering?
•
26
The following are valid reasons to reduce the
level of privilege for workstation users
• 27 The purpose for putting a “canary” value in the stack
is:
• 28
An organization wants to prevent SQL and script
injection attacks on its Internet web application. The
organization should implement a/an: