Multiple Choice
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
A) stop SQL injection attacks
B) prevent email spoofing
C) prevent brute force attacks
D) provide physical security
E) prevent unauthorized encryption
Correct Answer:

Verified
Correct Answer:
Verified
Q77: Which of the following statements is True
Q78: What is key escrow?
Q79: How should organizations respond to security incidents?
Q80: _ are viruses that masquerade as useful
Q81: What is the basic information that a
Q83: Removing and disabling _ that may contain
Q84: _ are the primary means of authentication
Q85: Human error cannot cause unauthorized data disclosure.
Q86: John has been appointed as an operations
Q87: Which of the following statements is True