CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 18
•
•
34
35
A defense in depth strategy for anti-malware is
recommended because:
The most effective countermeasures against input
attacks are:
•
36
A database administrator (DBA) is responsible
for carrying out security policy, which includes controlling
which users have access to which data. The DBA has been asked
to make just certain fields in some database tables visible to
some new users. What is the best course of action for the DBA
to take?
•
•
37
38
•
The following are characteristics of a computer
virus EXCEPT:
A list of all of the significant events that occur in
an application is known as:
39
The purpose of a parallel test is:
• 40
The first priority for disaster response should be:
• 41 In what sequence should a disaster recovery planning
project be performed?
•
42
For the purpose of business continuity and
disaster recovery planning, the definition of a “disaster” is:
•
43
The purpose of a server cluster includes all of the
following EXCEPT: