Multiple Choice
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
A) stop SQL injection attacks
B) prevent email spoofing
C) prevent brute force attacks
D) provide physical security
Correct Answer:

Verified
Correct Answer:
Verified
Q15: The process of hardening a Web site
Q16: In the context of malware protection, the
Q16: Define encryption and explain symmetric and asymmetric
Q17: Key escrow is a(n)_.<br>A)protocol used to secure
Q18: Spoofing occurs when a person receives a
Q21: In asymmetric encryption, each site has a
Q22: _ protect databases and other organizational data.<br>A)Cookies<br>B)Payloads<br>C)Data
Q23: Which of the following is classified as
Q37: If the incident-response plan is not well-prepared,
Q92: What is a virus? Differentiate between Trojan