Free RC0-501 Exam Braindumps (page: 42)

Page 41 of 87

A director of IR is reviewing a report regarding several recent breaches. The director complies the following statistics:
Initial IR engagement time frame
Length of time before an executive management notice went out Average IR phase completion
The director wants to use data to shorten the response time.
Which of the following would accomplish this?

  1. CSIRT
  2. Containment phase
  3. Escalation notifications
  4. Tabletop exercise

Answer(s): D



A copy of a highly confidential salary report was recently found on a printer in the IT department. The human resources department does not have this specific printer mapped to its devices, and it is suspected that an employee in the IT department browsed to the share where the report was located and printed it without authorization.
Which of the following technical controls would be the BEST choice to immediately prevent this from happening again?

  1. Implement a DLP solution and classify the report as confidential, restricting access only to human resources staff
  2. Restrict access to the share where the report resides to only human resources employees and enable auditing
  3. Have all members of the IT department review and sign the AUP and disciplinary policies
  4. Place the human resources computers on a restricted VLAN and configure the ACL to prevent access from the IT department

Answer(s): B



A company is developing a new system that will unlock a computer automatically when an authorized user sits in front of it, and then lock the computer when the user leaves. The user does not have to perform any action for this process to occur.
Which of the following technologies provides this capability?

  1. Facial recognition
  2. Fingerprint scanner
  3. Motion detector
  4. Smart cards

Answer(s): A



A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of database used and SQL commands that the database accepts.
Which of the following should the security analyst use to prevent this vulnerability?

  1. Application fuzzing
  2. Error handling
  3. Input validation
  4. Pointer dereference

Answer(s): C






Post your Comments and Discuss CompTIA RC0-501 exam with other Community members:

RC0-501 Discussions & Posts