24.11.2017 Views

412-79V9 Exam Practice Software

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Which of the following is not the SQL injection attack character?<br />

A. $<br />

B. PRINT<br />

C. #<br />

D. @@variable<br />

Answer: A<br />

Question: 6<br />

Which of the following is the objective of Gramm-Leach-Bliley Act?<br />

A. To ease the transfer of financial information between institutions and banks<br />

B. To protect the confidentiality, integrity, and availability of data<br />

C. To set a new or enhanced standards for all U.S. public company boards, management and public<br />

accounting firms<br />

D. To certify the accuracy of the reported financial statement<br />

Answer: A<br />

Explanation:<br />

Reference:<br />

http://www.itap.purdue.edu/security/policies/glb_safeguards_rule_training_general.pdf<br />

Question: 7<br />

Which of the following contents of a pen testing project plan addresses the strengths, weaknesses,<br />

opportunities, and threats involved in the project?<br />

A. Project Goal<br />

B. Success Factors<br />

C. Objectives<br />

D. Assumptions<br />

Question: 8<br />

Answer: D<br />

In a TCP packet filtering firewall, traffic is filtered based on specified session rules, such as when a<br />

session is initiated by a recognized computer.<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!