Free RC0-501 Exam Braindumps (page: 25)

Page 24 of 87

An analyst is reviewing a simple program for potential security vulnerabilities before being deployed to a Windows server. Given the following code:



Which of the following vulnerabilities is present?

  1. Bad memory pointer
  2. Buffer overflow
  3. Integer overflow
  4. Backdoor

Answer(s): B



An organization's file server has been virtualized to reduce costs.
Which of the following types of backups would be MOST appropriate for the particular file server?

  1. Snapshot
  2. Full
  3. Incremental
  4. Differential

Answer(s): C



A wireless network uses a RADIUS server that is connected to an authenticator, which in turn connects to a supplicant.
Which of the following represents the authentication architecture in use?

  1. Open systems authentication
  2. Captive portal
  3. RADIUS federation
  4. 802.1x

Answer(s): D



An employer requires that employees use a key-generating app on their smartphones to log into corporate applications. In terms of authentication of an individual, this type of access policy is BEST defined as:

  1. Something you have.
  2. Something you know.
  3. Something you do.
  4. Something you are.

Answer(s): A






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts