Free RC0-501 Exam Braindumps (page: 37)

Page 36 of 87

Which of the following types of attacks precedes the installation of a rootkit on a server?

  1. Pharming
  2. DDoS
  3. Privilege escalation
  4. DoS

Answer(s): C



Which of the following cryptographic algorithms is irreversible?

  1. RC4
  2. SHA-256
  3. DES
  4. AES

Answer(s): B



A security analyst receives an alert from a WAF with the following payload:
var data= "<test test test>" ++ <../../../../../../etc/passwd>" Which of the following types of attacks is this?

  1. Cross-site request forgery
  2. Buffer overflow
  3. SQL injection
  4. JavaScript data insertion
  5. Firewall evasion scipt

Answer(s): D



A workstation puts out a network request to locate another system. Joe, a hacker on the network, responds before the real system does, and he tricks the workstation into communicating with him.
Which of the following BEST describes what occurred?

  1. The hacker used a race condition.
  2. The hacker used a pass-the-hash attack.
  3. The hacker-exploited importer key management.
  4. The hacker exploited weak switch configuration.

Answer(s): D






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts