Question 491
Which of the following are the MOST important criteria when selecting virus protection software?
Question 492
After a risk assessment study, a bank with global operations decided to continue doing business in certain regions of the world where identity theft is rampant. The information security manager should encourage the business to:
Question 493
Which of the following is the BEST method to provide a new user with their initial password for e-mail system access?
Question 494
Which of the following, using public key cryptography, ensures authentication, confidentiality and nonrepudiation of a message?
Question 495
What is the BEST defense against a Structured Query Language (SQL) injection attack?