Question: 1
The Federal Information Processing Standards (FIPS) are primarily for use by (choose all that apply):
Question: 2
Sophisticated database systems provide many layers and types of security, including (choose all that apply):
Question: 3
Which of the following refers to an important procedure when evaluating database security (choose the BEST answer)?
Question: 4
Which of the following refers to any authentication protocol that requires two independent ways to establish identity and privileges?
Question: 5
Common implementations of strong authentication may use which of the following factors in their authentication efforts (choose all that apply):