1.
Consider the following scenario. A user receive an email with a link to a video about a news item, but another valid page, for instance a product page on ebay.com, can be hidden on top underneath the 'Play' button of the news video. The user tries to play' the video but actually buys' the product from ebay.com. Which malicious technique is used in the above scenario?
2.
Which of the following concepts are included in the security of a SAN? Each correct answer represents a complete solution. Choose all that apply.
3.
Which of the following are the reasons to use SAN? Each correct answer represents a complete solution. Choose all that apply.
4.
In which level of threats of the SAN are threats large scale attacks and difficult to prevent?
5.
Which of the following features are provided by SAN for SQL servers? Each correct answer represents a complete solution. Choose all that apply.