CompTIA JK0-018 - CompTIA Security+ E2C Exam

Page:    1 / 164   
Total 820 questions

Which of the following is the BEST approach to perform risk mitigation of user access control rights?

  • A. Conduct surveys and rank the results.
  • B. Perform routine user permission reviews.
  • C. Implement periodic vulnerability scanning.
  • D. Disable user accounts that have not been used within the last two weeks.


Answer : B

Which of the following devices is BEST suited for servers that need to store private keys?

  • A. Hardware security module
  • B. Hardened network firewall
  • C. Solid state disk drive
  • D. Hardened host firewall


Answer : A

All of the following are valid cryptographic hash functions EXCEPT:

  • A. RIPEMD.
  • B. RC4.
  • C. SHA-512.
  • D. MD4.


Answer : B

In regards to secure coding practices, why is input validation important?

  • A. It mitigates buffer overflow attacks.
  • B. It makes the code more readable.
  • C. It provides an application configuration baseline.
  • D. It meets gray box testing standards.


Answer : A

Which of the following would be used when a higher level of security is desired for encryption key storage?

  • A. TACACS+
  • B. L2TP
  • C. LDAP
  • D. TPM


Answer : D

Page:    1 / 164   
Total 820 questions