1.
Which of the following is NOT a type of firewall?
2.
Which of the following is a common technique to secure data during transmission?
3.
Which normal form is concerned with eliminating transitive dependencies?
4.
A method of validating the authenticity of a user is known as?
5.
Which of these is a principle of data security that ensures only authorized users can access specific data?
6.
Which of the following is a type of attack where the attacker injects malicious SQL code?