Free RC0-501 Exam Braindumps (page: 30)

Page 29 of 87

A system administrator is reviewing the following information from a compromised server.



Given the above information, which of the following processes was MOST likely exploited via remote buffer overflow attack?

  1. Apache
  2. LSASS
  3. MySQL
  4. TFTP

Answer(s): A



Joe, a security administrator, needs to extend the organization's remote access functionality to be used by staff while travelling. Joe needs to maintain separate access control functionalities for internal, external, and VOIP services.
Which of the following represents the BEST access technology for Joe to use?

  1. RADIUS
  2. TACACS+
  3. Diameter
  4. Kerberos

Answer(s): B



The availability of a system has been labeled as the highest priority.
Which of the following should be focused on the MOST to ensure the objective?

  1. Authentication
  2. HVAC
  3. Full-disk encryption
  4. File integrity checking

Answer(s): B



As part of the SDLC, a third party is hired to perform a penetration test. The third party will have access to the source code, integration tests, and network diagrams.
Which of the following BEST describes the assessment being performed?

  1. Black box
  2. Regression
  3. White box
  4. Fuzzing

Answer(s): C






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts