292 Chapter 12 ■ Practice Test 4
- Mike has a flash memory card that he would like to reuse. The card contains sensitive
information. What technique can he use to securely remove data from the card and allow
its reuse?
A. Degaussing
B. Physical destruction
C. Overwriting
D. Reformatting - Carlos is investigating the compromise of sensitive information in his organization. He
believes that attackers managed to retrieve personnel information on all employees from
the database and finds the following user-supplied input in a log entry for a web-based
personnel management system:
Collins’&1=1;––
What type of attack took place?
A. SQL injection
B. Buffer overflow
C. Cross-site scripting
D. Cross-site request forgery
- Which one of the following is a detailed, step-by-step document that describes the exact
actions that individuals must complete?
A. Policy
B. Standard
C. Guideline
D. Procedure - What principle of relational databases ensures the permanency of transactions that have
successfully completed?
A. Atomicity
B. Consistency
C. Isolation
D. Durability - Bryan has a set of sensitive documents that he would like to protect from public disclo-
sure. He would like to use a control that, if the documents appear in a public forum, may
be used to trace the leak back to the person who was originally given the document copy.
What security control would best fulfill this purpose?
A. Digital signature
B. Document staining
C. Hashing
D. Watermarking