Free RC0-501 Exam Braindumps (page: 31)

Page 30 of 87

A dumpster diver recovers several hard drives from a company and is able to obtain confidential data from one of the hard drives. The company then discovers its information is posted online.
Which of the following methods would have MOST likely prevented the data from being exposed?

  1. Removing the hard drive from its enclosure
  2. Using software to repeatedly rewrite over the disk space
  3. Using Blowfish encryption on the hard drives
  4. Using magnetic fields to erase the data

Answer(s): D



Which of the following are methods to implement HA in a web application server environment? (Select two.)

  1. Load balancers
  2. Application layer firewalls
  3. Reverse proxies
  4. VPN concentrators
  5. Routers

Answer(s): A,B



An application developer is designing an application involving secure transports from one service to another that will pass over port 80 for a request.
Which of the following secure protocols is the developer MOST likely to use?

  1. FTPS
  2. SFTP
  3. SSL
  4. LDAPS

Answer(s): C



Which of the following precautions MINIMIZES the risk from network attacks directed at multifunction printers, as well as the impact on functionality at the same time?

  1. Isolating the systems using VLANs
  2. Installing a software-based IPS on all devices
  3. Enabling full disk encryption
  4. Implementing a unique user PIN access functions

Answer(s): A






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts