Why is "slack space" of value to an information security manager as pan of an incident investigation
Why is “slack space” of value to an information security manager as pan of an incident
investigation?
The objective of concurrency control in a database system is to:
The objective of concurrency control in a database system is to:
What is the PRIMARY objective of a post-event review in incident response?
What is the PRIMARY objective of a post-event review in incident response?
Which of the following controls would provide the GREATEST assurance of database integrity?
Which of the following controls would provide the GREATEST assurance of database integrity?
Detailed business continuity plans should be based PRIMARILY on:
Detailed business continuity plans should be based PRIMARILY on:
Which of the following transaction processing features has been violated?
An IS auditor analyzing the audit log of a database management system (DBMS) finds that some
transactions were partially executed as a result of an error, and are not rolled back. Which of the
following transaction processing features has been violated?
The next step should be to:
A web server in a financial institution that has been compromised using a super-user account has
been isolated, and proper forensic processes have been followed. The next step should be to:
The consequence is that:
During maintenance of a relational database, several values of the foreign key in a transaction
table of a relational database have been corrupted. The consequence is that:
What would be the BEST source?
Evidence from a compromised server has to be acquired for a forensic investigation. What would
be the BEST source?
which of the following keys would prevent deletion of a row from a customer table as long as the customer numb
In a relational database with referential integrity, the use of which of the following keys would
prevent deletion of a row from a customer table as long as the customer number of that row is
stored with live orders on the orders table?