Which of the following is the BEST approach to perform risk mitigation of user access control rights?
Answer : B
Which of the following devices is BEST suited for servers that need to store private keys?
Answer : A
All of the following are valid cryptographic hash functions EXCEPT:
Answer : B
In regards to secure coding practices, why is input validation important?
Answer : A