CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 24

• 22 • Video surveillance is an example of what type(s) of control: 23 Which of the following is NOT an authentication protocol: • 24 An information system that processes sensitive information is configured to require a valid userid and strong password from any user. This process of accepting and validating this information is known as: • 25 What is the best defense against social engineering? • 26 The following are valid reasons to reduce the level of privilege for workstation users • 27 The purpose for putting a “canary” value in the stack is: • 28 An organization wants to prevent SQL and script injection attacks on its Internet web application. The organization should implement a/an: