Question 491

Which of the following are the MOST important criteria when selecting virus protection software?
  • Question 492

    After a risk assessment study, a bank with global operations decided to continue doing business in certain regions of the world where identity theft is rampant. The information security manager should encourage the business to:
  • Question 493

    Which of the following is the BEST method to provide a new user with their initial password for e-mail system access?
  • Question 494

    Which of the following, using public key cryptography, ensures authentication, confidentiality and nonrepudiation of a message?
  • Question 495

    What is the BEST defense against a Structured Query Language (SQL) injection attack?