Free RC0-501 Exam Braindumps (page: 38)

Page 37 of 87

Audit logs from a small company's vulnerability scanning software show the following findings:
Destinations scanned:
-Server001- Internal human resources payroll server
-Server101-Internet-facing web server
-Server201- SQL server for Server101
-Server301-Jumpbox used by systems administrators accessible from the internal network Validated vulnerabilities found:
-Server001- Vulnerable to buffer overflow exploit that may allow attackers to install software -Server101- Vulnerable to buffer overflow exploit that may allow attackers to install software -Server201-OS updates not fully current
-Server301- Accessible from internal network without the use of jumpbox -Server301-Vulnerable to highly publicized exploit that can elevate user privileges Assuming external attackers who are gaining unauthorized information are of the highest concern, which of the following servers should be addressed FIRST?

  1. Server001
  2. Server101
  3. Server201
  4. Server301

Answer(s): B



A security analyst wants to harden the company's VoIP PBX. The analyst is worried that credentials may be intercepted and compromised when IP phones authenticate with the BPX.
Which of the following would best prevent this from occurring?

  1. Implement SRTP between the phones and the PBX.
  2. Place the phones and PBX in their own VLAN.
  3. Restrict the phone connections to the PBX.
  4. Require SIPS on connections to the PBX.

Answer(s): D



An organization is comparing and contrasting migration from its standard desktop configuration to the newest version of the platform. Before this can happen, the Chief Information Security Officer (CISO) voices the need to evaluate the functionality of the newer desktop platform to ensure interoperability with existing software in use by the organization. In which of the following principles of architecture and design is the CISO engaging?

  1. Dynamic analysis
  2. Change management
  3. Baselining
  4. Waterfalling

Answer(s): B



A security administrator suspects a MITM attack aimed at impersonating the default gateway is underway.
Which of the following tools should the administrator use to detect this attack? (Select two.)

  1. Ping
  2. Ipconfig
  3. Tracert
  4. Netstat
  5. Dig
  6. Nslookup

Answer(s): B,C






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts