Which of the following procedures is designed to contain data, hardware, and software that can be critical for
Which of the following procedures is designed to contain data, hardware, and software that can be
critical for a business?
What encryption algorithm is used by PERL crypt() function?
What encryption algorithm is used by PERL crypt() function?
Which of the following steps are performed by you for secure recovery based on the extent of the disaster and
You work as a security manager for SoftTech Inc. You along with your team are doing the disaster
recovery for your project. Which of the following steps are performed by you for secure recovery
based on the extent of the disaster and the organization’s recovery ability?
Each correct answer represents a part of the solution. Choose three.
What file should Cylie insert the following line into?
Cylie is the Oracle DBA for her company and now wants to track all actions on her Oracle server
using auditing. What file should Cylie insert the following line into?
audit_trail = true
which of the following disaster recovery tests can this task be performed?
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and
you want to discuss it with your team members for getting appropriate responses of the disaster.
In which of the following disaster recovery tests can this task be performed?
What function could Travis use to protect against session hijacking in his PHP code?
Travis is writing a website in PHP but is worried about its inherent vulnerability from session
hijacking. What function could Travis use to protect against session hijacking in his PHP code?
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
Which of the following refers to the ability to ensure that the data is not modified or tampered with?
Which of the following plans is designed to protect critical business processes from natural or man-made failu
Which of the following plans is designed to protect critical business processes from natural or
man-made failures or disasters and the resultant loss of capital due to the unavailability of normal
business processes?
What vulnerability is the following code susceptible to?
What vulnerability is the following code susceptible to?
CREATE OR REPLACE PROCEDURE demo (name in VARCHAR2) as
cursor_name INTEGER;
rows_processed INTEGER;
sql VARCHAR2(150);
code VARCHAR2(2);
BEGIN
…
sql := ‘SELECT postal_code FROM states WHERE state_name = ”’
|| ””;
cursor_name := dbms_sql.open_cursor;
DBMS_SQL.PARSE(cursor_name, sql, DBMS_SQL.NATIVE);
DBMS_SQL.DEFINE_COLUMN(cursor_name, 1, code, 10);
row_processed:= DMBS_SQL.EXECUTIVE(cursor_name);
DBMS_SQL.CLOSE_CURSOR(cursor_name);
Which of the following BCP teams handles financial arrangement, public relations, and media inquiries at the t
Which of the following BCP teams handles financial arrangement, public relations, and media
inquiries at the time of disaster recovery?