Free RC0-501 Exam Braindumps (page: 32)

Page 31 of 87

After an identified security breach, an analyst is tasked to initiate the IR process.
Which of the following is the NEXT step the analyst should take?

  1. Recovery
  2. Identification
  3. Preparation
  4. Documentation
  5. Escalation

Answer(s): B



A company was recently audited by a third party. The audit revealed the company's network devices were transferring files in the clear.
Which of the following protocols should the company use to transfer files?

  1. HTTPS
  2. LDAPS
  3. SCP
  4. SNMPv3

Answer(s): C



During a monthly vulnerability scan, a server was flagged for being vulnerable to an Apache Struts exploit. Upon further investigation, the developer responsible for the server informs the security team that Apache Struts is not installed on the server.
Which of the following BEST describes how the security team should reach to this incident?

  1. The finding is a false positive and can be disregarded
  2. The Struts module needs to be hardened on the server
  3. The Apache software on the server needs to be patched and updated
  4. The server has been compromised by malware and needs to be quarantined.

Answer(s): A



A systems administrator wants to protect data stored on mobile devices that are used to scan and record assets in a warehouse. The control must automatically destroy the secure container of mobile devices if they leave the warehouse.
Which of the following should the administrator implement? (Select two.)

  1. Geofencing
  2. Remote wipe
  3. Near-field communication
  4. Push notification services
  5. Containerization

Answer(s): A,E






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts