91. The structured query language (SQL) server enables many users to access the same database simultaneously. Which of the following locks is held until the end of the transaction?
a.
Exclusive lockb.
Page lockc.
Table lockd.
Read lockThe SQL server locks either pages or entire tables, depending on the query plan for the transactions. Read locks are usually held only long enough to read the page and then are released. These are ways to prevent deadlocks when several users simultaneously request the same resource.
92. Which of the following is an example of the last line-of-defense?
a.
Perimeter barriersb.
Property insurancec.
Separation of dutiesd.
Integrity verification software93. Which of the following is an example of second line-of-defense?
a.
System isolation techniquesb.
Minimum security controlsc.
Penetration testingd.
Split knowledge proceduresThe other three choices are examples of the first line-of-defense mechanisms. Penetration testing follows vulnerability scanning and network scanning, where the latter are first line-of-defenses. Penetration testing either proves or disproves the vulnerabilities identified in vulnerability/network scanning.
The line-of-defenses are security mechanisms for limiting and controlling access to and use of computer system resources. They exercise a directing or restraining influence over the behavior of individuals and the content of computer systems. The line-of-defenses form a core part of defense-in-depth strategy or security-in-depth strategy.
94. Which of the following is an example of last line-of-defense?
a.
Quality assuranceb.
System administratorsc.
Physical security controlsd.
Employee bond coverage95. In a public cloud computing environment, which of the following provides server-side protection?
a.
Encrypted network exchangesb.
Plug-ins and add-onsc.
Keystroke loggersd.
Virtual firewallsPlug-ins, add-ons, backdoor Trojan viruses, and keystroke loggers are examples of client-side risks or threats to be protected from. Encrypted network exchanges provide client-side protection.
96. Which of the following is not a core part of defense-in-depth strategy?
a.
Least functionalityb.
Layered protectionsc.
System partitioningd.
Line-of-defenses