Free RC0-501 Exam Braindumps (page: 26)

Page 25 of 87

Adhering to a layered security approach, a controlled access facility employs security guards who verify the authorization of all personnel entering the facility.
Which of the following terms BEST describes the security control being employed?

  1. Administrative
  2. Corrective
  3. Deterrent
  4. Compensating

Answer(s): C



A security analyst is hardening a web server, which should allow a secure certificate-based session using the organization's PKI infrastructure. The web server should also utilize the latest security techniques and standards. Given this set of requirements, which of the following techniques should the analyst implement to BEST meet these requirements? (Select two.)

  1. Install an X- 509-compliant certificate.
  2. Implement a CRL using an authorized CA.
  3. Enable and configure TLS on the server.
  4. Install a certificate signed by a public CA.
  5. Configure the web server to use a host header.

Answer(s): A,C



A manager wants to distribute a report to several other managers within the company. Some of them reside in remote locations that are not connected to the domain but have a local server. Because there is sensitive data within the report and the size of the report is beyond the limit of the email attachment size, emailing the report is not an option.
Which of the following protocols should be implemented to distribute the report securely? (Select three.)

  1. S/MIME
  2. SSH
  3. SNMPv3
  4. FTPS
  5. SRTP
  6. HTTPS
  7. LDAPS

Answer(s): B,D,F



An auditor is reviewing the following output from a password-cracking tool:



Which of the following methods did the author MOST likely use?

  1. Hybrid
  2. Dictionary
  3. Brute force
  4. Rainbow table

Answer(s): A






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts