Free RC0-501 Exam Braindumps (page: 41)

Page 40 of 87

A security analyst notices anomalous activity coming from several workstations in the organizations. Upon identifying and containing the issue, which of the following should the security analyst do NEXT?

  1. Document and lock the workstations in a secure area to establish chain of custody
  2. Notify the IT department that the workstations are to be reimaged and the data restored for reuse
  3. Notify the IT department that the workstations may be reconnected to the network for the users to continue working
  4. Document findings and processes in the after-action and lessons learned report

Answer(s): D



An employee receives an email, which appears to be from the Chief Executive Officer (CEO), asking for a report of security credentials for all users.
Which of the following types of attack is MOST likely occurring?

  1. Policy violation
  2. Social engineering
  3. Whaling
  4. Spear phishing

Answer(s): D



An information security analyst needs to work with an employee who can answer questions about how data for a specific system is used in the business. The analyst should seek out an employee who has the role of:

  1. steward
  2. owner
  3. privacy officer
  4. systems administrator

Answer(s): B



A group of non-profit agencies wants to implement a cloud service to share resources with each other and minimize costs.
Which of the following cloud deployment models BEST describes this type of effort?

  1. Public
  2. Hybrid
  3. Community
  4. Private

Answer(s): C






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts