Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > CompTIA > CompTIA Security+ > RC0-501 > RC0-501 Online Practice Questions and Answers

RC0-501 Online Practice Questions and Answers

Questions 4

A forensic analyst is asked to respond to an ongoing network attack on a server. Place the items in the list below in the correct order in which the forensic analyst should preserve them.

Select and Place:

Buy Now

Correct Answer:

When dealing with multiple issues, address them in order of volatility (OOV); always deal with the most volatile first. Volatility can be thought of as the amount of time that you have to collect certain data before a window of opportunity is gone.

Naturally, in an investigation you want to collect everything, but some data will exist longer than others, and you cannot possibly collect all of it once. As an example, the OOV in an investigation may be RAM, hard drive data, CDs/DVDs, and

printouts.

Order of volatility: Capture system images as a snapshot of what exists, look at network traffic and logs, capture any relevant video/screenshots/hashes, record time offset on the systems, talk to witnesses, and track total man-hours and

expenses associated with the investigation.

Questions 5

A new intern in the purchasing department requires read access to shared documents. Permissions are normally controlled through a group called "Purchasing", however, the purchasing group permissions allow write access. Which of the following would be the BEST course of action?

A. Modify all the shared files with read only permissions for the intern.

B. Create a new group that has only read permissions for the files.

C. Remove all permissions for the shared files.

D. Add the intern to the "Purchasing" group.

Buy Now

Correct Answer: B

Questions 6

An administrator is testing the collision resistance of different hashing algorithms. Which of the following is the strongest collision resistance test?

A. Find two identical messages with different hashes

B. Find two identical messages with the same hash

C. Find a common has between two specific messages

D. Find a common hash between a specific message and a random message

Buy Now

Correct Answer: A

Questions 7

Which of the following techniques can be bypass a user or computer's web browser privacy settings? (Select Two)

A. SQL injection

B. Session hijacking

C. Cross-site scripting

D. Locally shared objects

E. LDAP injection

Buy Now

Correct Answer: BC

Questions 8

A security administrator is creating a subnet on one of the corporate firewall interfaces to use as a DMZ which is expected to accommodate at most 14 physical hosts. Which of the following subnets would BEST meet the requirements?

A. 192.168.0.16 255.25.255.248

B. 192.168.0.16/28

C. 192.168.1.50 255.255.25.240

D. 192.168.2.32/27

Buy Now

Correct Answer: B

Questions 9

Which of the following is the summary of loss for a given year?

A. MTBF

B. ALE

C. SLA

D. ARO

Buy Now

Correct Answer: B

Questions 10

A system administrator is configuring a site-to-site VPN tunnel. Which of the following should be configured on the VPN concentrator during the IKE phase?

A. RIPEMD

B. ECDHE

C. Diffie-Hellman

D. HTTPS

Buy Now

Correct Answer: C

Questions 11

Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?

A. Sustainability

B. Homogeneity

C. Resiliency

D. Configurability

Buy Now

Correct Answer: C

Questions 12

The availability of a system has been labeled as the highest priority. Which of the following should be focused on the MOST to ensure the objective?

A. Authentication

B. HVAC

C. Full-disk encryption

D. File integrity checking

Buy Now

Correct Answer: B

Questions 13

Which of the following precautions MINIMIZES the risk from network attacks directed at multifunction printers, as well as the impact on functionality at the same time?

A. Isolating the systems using VLANs

B. Installing a software-based IPS on all devices

C. Enabling full disk encryption

D. Implementing a unique user PIN access functions

Buy Now

Correct Answer: A

Exam Code: RC0-501
Exam Name: CompTIA Security+ Recertification Exam
Last Update: Jun 09, 2025
Questions: 349

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.