All of the following are valid cryptographic hash functions EXCEPT:
All of the following are valid cryptographic hash functions EXCEPT:
why is input validation important?
In regards to secure coding practices, why is input validation important?
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following would be used when a higher level of security is desired for
encryption key storage?
Which of the following log types would the administrator check?
A security administrator needs to determine which system a particular user is trying to login
to at various times of the day. Which of the following log types would the administrator
check?
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized acce
Which of the following MUST be updated immediately when an employee is terminated to
prevent unauthorized access?
Which of the following describes this access control type?
Employee badges are encoded with a private encryption key and specific personal
information. The encoding is then used to provide access to the network. Which of the
following describes this access control type?
Which of the following devices would MOST likely have a DMZ interface?
Which of the following devices would MOST likely have a DMZ interface?
Which of the following application security testing techniques is implemented when an automated system generat
Which of the following application security testing techniques is implemented when an
automated system generates random input data?
Which of the following can be used by a security administrator to successfully recover a user’s forgotte
Which of the following can be used by a security administrator to successfully recover a
user’s forgotten password on a password protected file?
Which of the following is the BEST tool to use?
A security administrator wants to check user password complexity. Which of the following is
the BEST tool to use?