CompTIA JK0-018 - CompTIA Security+ E2C Exam
Page: 1 / 164
Total 820 questions
Question #1 (Topic: Topic 1)
Which of the following is the BEST approach to perform risk mitigation of user access
control rights?
control rights?
A. Conduct surveys and rank the results.
B. Perform routine user permission reviews.
C. Implement periodic vulnerability scanning.
D. Disable user accounts that have not been used within the last two weeks.
Answer: B
Question #2 (Topic: Topic 1)
Which of the following devices is BEST suited for servers that need to store private keys?
A. Hardware security module
B. Hardened network firewall
C. Solid state disk drive
D. Hardened host firewall
Answer: A
Question #3 (Topic: Topic 1)
All of the following are valid cryptographic hash functions EXCEPT:
A. RIPEMD.
B. RC4.
C. SHA-512.
D. MD4.
Answer: B
Question #4 (Topic: Topic 1)
In regards to secure coding practices, why is input validation important?
A. It mitigates buffer overflow attacks.
B. It makes the code more readable.
C. It provides an application configuration baseline.
D. It meets gray box testing standards.
Answer: A
Question #5 (Topic: Topic 1)
Which of the following would be used when a higher level of security is desired for
encryption key storage?
encryption key storage?
A. TACACS+
B. L2TP
C. LDAP
D. TPM
Answer: D