Vcehome > CompTIA > CompTIA Security+ > RC0-501 > RC0-501 Online Practice Questions and Answers

RC0-501 Online Practice Questions and Answers

Questions 4

A penetration testing is preparing for a client engagement in which the tester must provide data that proves and validates the scanning tools' results. Which of the following is the best method for collecting this information?

A. Set up the scanning system's firewall to permit and log all outbound connections

B. Use a protocol analyzer to log all pertinent network traffic

C. Configure network flow data logging on all scanning system

D. Enable debug level logging on the scanning system and all scanning tools used.

Browse 349 Q&As
Questions 5

A Chief Security Officer (CSO) has been unsuccessful in attempts to access the website for a potential partner (www.example.net). Which of the following rules is preventing the CSO from accessing the site? Blocked sites: *.nonews.com, *.rumorhasit.net, *.mars?

A. Rule 1: deny from inside to outside source any destination any service smtp

B. Rule 2: deny from inside to outside source any destination any service ping

C. Rule 3: deny from inside to outside source any destination {blocked sites} service http-https

D. Rule 4: deny from any to any source any destination any service any

Browse 349 Q&As
Questions 6

When designing a web based client server application with single application server and database cluster backend, input validation should be performed:

A. On the client

B. Using database stored procedures

C. On the application server

D. Using HTTPS

Browse 349 Q&As
Questions 7

An administrator has configured a new Linux server with the FTP service. Upon verifying that the service was configured correctly, the administrator has several users test the FTP service. Users report that they are able to connect to the FTP

service and download their personal files, however, they cannot transfer new files to the server.

Which of the following will most likely fix the uploading issue for the users?

A. Create an ACL to allow the FTP service write access to user directories

B. Set the Boolean selinux value to allow FTP home directory uploads

C. Reconfigure the ftp daemon to operate without utilizing the PSAV mode

D. Configure the FTP daemon to utilize PAM authentication pass through user permissions

Browse 349 Q&As
Questions 8

An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of: A. Passive reconnaissance

B. Persistence

C. Escalation of privileges

D. Explogting the switch

Browse 349 Q&As
Questions 9

Which of the following works by implanting software on systems but delays execution until a specific set of conditions is met?

A. Logic bomb

B. Trojan

C. Scareware

D. Ransomware

Browse 349 Q&As
Questions 10

An employee uses RDP to connect back to the office network. If RDP is misconfigured, which of the following security exposures would this lead to?

A. A virus on the administrator's desktop would be able to sniff the administrator's username and password.

B. Result in an attacker being able to phish the employee's username and password.

C. A social engineering attack could occur, resulting in the employee's password being extracted.

D. A man in the middle attack could occur, resulting the employee's username and password being captured.

Browse 349 Q&As
Questions 11

Which of the following types of cloud Infrastructures would allow several organizations with similar structures and interests to realize shared storage and resources?

A. Private

B. Hybrid

C. Public

D. Community

Browse 349 Q&As
Questions 12

A computer on a company network was infected with a zero-day explogt after an employee accidently opened an email that contained malicious content. The employee recognized the email as malicious and was attempting to delete it, but

accidently opened it. Which of the following should be done to prevent this scenario from occurring again in the future?

A. Install host-based firewalls on all computers that have an email client installed

B. Set the email program default to open messages in plain text

C. Install end-point protection on all computers that access web email

D. Create new email spam filters to delete all messages from that sender

Browse 349 Q&As
Questions 13

An information security specialist is reviewing the following output from a Linux server.

Based on the above information, which of the following types of malware was installed on the server?

A. Logic bomb

B. Trojan

C. Backdoor

D. Ransomware

E. Rootkit

Browse 349 Q&As
Exam Code: RC0-501
Exam Name: CompTIA Security+ Recertification Exam
Last Update: May 06, 2024
Questions: 349 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99