Shanise is an IT security professional for a large private bank. She got an alert that the bank website received a funds transfer request that was correctly credentialed but flagged as being out of the account owner's usual pattern. If the alert is correct, what type of attack has likely occurred? CSRF attack Replay attack XSS attack SQL injection {Ans: CSRF attack}Several quantitative tools like mean time between failure (MTBF), mean time to recovery (MTTR), mean time to failure (MTTF), and failure in time (FIT) can be used to predict the likelihood of the risk. Which of these tools perform similar functions? MTTF and MTTR MTBF and MTTF MTBF and FIT FIT and MTTR {Ans: MTBF and FIT}John is instructed by his CEO to introduce an employee attendance system that replaces the current manual-sign register. The organization doesn't allow personal electronic devices into the premises. What method should John use for this system? NFC RFID Bluetooth WLAN network {Ans: RFID}John and Sarah are working for Star Alliance. John had to send certain confidential data and messages to Sarah online. The use of which of the following will ensure that the message's sender is, in fact, John? Digital