CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 17
password from any user. This process of accepting and
validating this information is known as:
•
25 What is the best defense against social engineering?
•
26
The following are valid reasons to reduce the
level of privilege for workstation users
• 27 The purpose for putting a “canary” value in the stack
is:
• 28
An organization wants to prevent SQL and script
injection attacks on its Internet web application. The
organization should implement a/an:
•
29
•
30
The instructions contained with an object are
known as its:
Rootkits can be difficult to detect because:
•
31
A user, Bill, has posted a link on a web site that
causes unsuspecting users to transfer money to Bill if they click
the link. The link will only work for users who happen to be
authenticated to the bank that is the target of the link. This is
known as:
•
32
•
33
An attack on a DNS server to implant forged “A”
records is characteristic of a:
“Safe languages” and “safe libraries” are so-
called because: