Free RC0-501 Exam Braindumps (page: 34)

Page 33 of 87

A system's administrator has finished configuring firewall ACL to allow access to a new web answer.



The security administrator confirms form the following packet capture that there is network traffic from the internet to the web server:



The company's internal auditor issues a security finding and requests that immediate action be taken. With which of the following is the auditor MOST concerned?

  1. Misconfigured firewall
  2. Clear text credentials
  3. Implicit deny
  4. Default configuration

Answer(s): B



Which of the following vulnerability types would the type of hacker known as a script kiddie be MOST dangerous against?

  1. Passwords written on the bottom of a keyboard
  2. Unpatched exploitable Internet-facing services
  3. Unencrypted backup tapes
  4. Misplaced hardware token

Answer(s): B



An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:

  1. Passive reconnaissance
  2. Persistence
  3. Escalation of privileges
  4. Exploiting the switch

Answer(s): D



A black hat hacker is enumerating a network and wants to remain convert during the process. The hacker initiates a vulnerability scan. Given the task at hand the requirement of being convert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?

  1. The vulnerability scanner is performing an authenticated scan.
  2. The vulnerability scanner is performing local file integrity checks.
  3. The vulnerability scanner is performing in network sniffer mode.
  4. The vulnerability scanner is performing banner grabbing.

Answer(s): C






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts