Free RC0-501 Exam Braindumps (page: 35)

Page 34 of 87

A development team has adopted a new approach to projects in which feedback is iterative and multiple iterations of deployments are provided within an application's full life cycle.
Which of the following software development methodologies is the development team using?

  1. Waterfall
  2. Agile
  3. Rapid
  4. Extreme

Answer(s): B



A Chief Executive Officer (CEO) suspects someone in the lab testing environment is stealing confidential information after working hours when no one else is around.
Which of the following actions can help to prevent this specific threat?

  1. Implement time-of-day restrictions.
  2. Audit file access times.
  3. Secretly install a hidden surveillance camera.
  4. Require swipe-card access to enter the lab.

Answer(s): D



NO: 135
A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an FTP server that had a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists form the vendor.
Which of the following BEST describes the reason why the vulnerability exists?

  1. Default configuration
  2. End-of-life system
  3. Weak cipher suite
  4. Zero-day threats

Answer(s): B



An organization uses SSO authentication for employee access to network resources.
When an employee resigns, as per the organization's security policy, the employee's access to all network resources is terminated immediately. Two weeks later, the former employee sends an email to the help desk for a password reset to access payroll information from the human resources server.
Which of the following represents the BEST course of action?

  1. Approve the former employee's request, as a password reset would give the former employee access to only the human resources server.
  2. Deny the former employee's request, since the password reset request came from an external email address.
  3. Deny the former employee's request, as a password reset would give the employee access to all network resources.
  4. Approve the former employee's request, as there would not be a security issue with the former employee gaining access to network.

Answer(s): C






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts