Free RC0-501 Exam Braindumps (page: 14)

Page 13 of 87

When performing data acquisition on a workstation, which of the following should be captured based on memory volatility? (Select two.)

  1. USB-attached hard disk
  2. Swap/pagefile
  3. Mounted network storage
  4. ROM
  5. RAM

Answer(s): B,E



Ann, a security administrator, has been instructed to perform fuzz-based testing on the company's applications.
Which of the following best describes what she will do?

  1. Enter random or invalid data into the application in an attempt to cause it to fault
  2. Work with the developers to eliminate horizontal privilege escalation opportunities
  3. Test the applications for the existence of built-in- back doors left by the developers
  4. Hash the application to verify it won't cause a false positive on the HIPS.

Answer(s): A



An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the future, Company.com wants to mitigate the impact of similar incidents.
Which of the following would assist Company.com with its goal?

  1. Certificate pinning
  2. Certificate stapling
  3. Certificate chaining
  4. Certificate with extended validation

Answer(s): A



A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to provide the domain administrator credentials.
Which of the following account types is the systems administrator using?

  1. Shared account
  2. Guest account
  3. Service account
  4. User account

Answer(s): C






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts