Pass4itsure > CompTIA > CompTIA Security+ > RC0-501 > RC0-501 Online Practice Questions and Answers

RC0-501 Online Practice Questions and Answers

Questions 4

The security administrator has installed a new firewall which implements an implicit DENY policy by default. Click on the firewall and configure it to allow ONLY the following communication.

1.

The Accounting workstation can ONLY access the web server on the public network over the default HTTPS port. The accounting workstation should not access other networks.

2.

The HR workstation should be restricted to communicate with the Financial server ONLY, over the default SCP port

3.

The Admin workstation should ONLY be able to access the servers on the secure network over the default TFTP port.

Instructions: The firewall will process the rules in a top-down manner in order as a first match The port number must be typed in and only one port number can be entered per rule Type ANY for all ports. The original firewall configuration can

be reset at any time by pressing the reset button. Once you have met the simulation requirements, click save and then Done to submit.

Hot Area:

Buy Now
Questions 5

Which of the fallowing security controls does an iris scanner provide?

A. Logical

B. Administrative

C. Corrective

D. Physical

E. Detective

F. Deterrent

Buy Now
Questions 6

A new security policy in an organization requires that all file transfers within the organization be completed using applications that provide secure transfer. Currently, the organization uses FTP and HTTP to transfer files. Which of the following should the organization implement in order to be compliant with the new policy?

A. Replace FTP with SFTP and replace HTTP with TLS

B. Replace FTP with FTPS and replaces HTTP with TFTP

C. Replace FTP with SFTP and replace HTTP with Telnet

D. Replace FTP with FTPS and replaces HTTP with IPSec

Buy Now
Questions 7

A security administrator has been asked to implement a VPN that will support remote access over IPSEC. Which of the following is an encryption algorithm that would meet this requirement?

A. MD5

B. AES

C. UDP

D. PKI

Buy Now
Questions 8

Refer to the following code:

Which of the following vulnerabilities would occur if this is executed?

A. Page exception

B. Pointer deference

C. NullPointerException

D. Missing null check

Buy Now
Questions 9

A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?

A. DMZ

B. NAT

C. VPN

D. PAT

Buy Now
Questions 10

Which of the following network vulnerability scan indicators BEST validates a successful, active scan?

A. The scan job is scheduled to run during off-peak hours.

B. The scan output lists SQL injection attack vectors.

C. The scan data identifies the use of privileged-user credentials.

D. The scan results identify the hostname and IP address.

Buy Now
Questions 11

A company has three divisions, each with its own networks and services. The company decides to make its secure web portal accessible to all employees utilizing their existing usernames and passwords. The security administrator has elected to use SAML to support authentication. In this scenario, which of the following will occur when users try to authenticate to the portal? (Select two.)

A. The portal will function as a service provider and request an authentication assertion.

B. The portal will function as an identity provider and issue an authentication assertion.

C. The portal will request an authentication ticket from each network that is transitively trusted.

D. The back-end networks will function as an identity provider and issue an authentication assertion.

E. The back-end networks will request authentication tickets from the portal, which will act as the third-party service provider authentication store.

F. The back-end networks will verify the assertion token issued by the portal functioning as the identity provider.

Buy Now
Questions 12

In terms of encrypting data, which of the following is BEST described as a way to safeguard password data by adding random data to it in storage?

A. Using salt

B. Using hash algorithms

C. Implementing elliptical curve

D. Implementing PKI

Buy Now
Questions 13

An organization's file server has been virtualized to reduce costs. Which of the following types of backups would be MOST appropriate for the particular file server?

A. Snapshot

B. Full

C. Incremental

D. Differential

Buy Now
Exam Code: RC0-501
Exam Name: CompTIA Security+ Recertification Exam
Last Update: Apr 30, 2024
Questions: 349
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99